mini_magick 3.2.1
Remote command execution via filename
high severity CVE-2019-13574>= 4.9.4
A remote shell execution vulnerability when using MiniMagick::Image.open with URL coming from unsanitized user input.
e.g. MiniMagick::Image.open("| touch.txt")
MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection
high severity CVE-2013-2616>= 3.6.0
MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input from an untrusted source passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
Gem version without a license.
Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.
This gem version is available.
This gem version has not been yanked and is still available for usage.