Vulnerabilities > Libgd > Libgd > 2.1.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-08-07 | CVE-2016-5116 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name. | 6.4 |
2016-05-22 | CVE-2015-8877 | Resource Management Errors vulnerability in multiple products The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function. | 5.0 |
2016-04-26 | CVE-2016-3074 | Incorrect Conversion between Numeric Types vulnerability in multiple products Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow. | 7.5 |