Vulnerabilities > Libgd > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-01-28 | CVE-2019-6978 | Double Free vulnerability in multiple products The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. | 9.8 |
2017-03-15 | CVE-2016-10166 | Integer Underflow (Wrap or Wraparound) vulnerability in Libgd Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable. | 9.8 |
2017-01-26 | CVE-2016-6912 | Double Free vulnerability in Libgd Double free vulnerability in the gdImageWebPtr function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via large width and height values. | 9.8 |
2017-01-04 | CVE-2016-8670 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libgd Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call. | 9.8 |
2016-09-28 | CVE-2016-7568 | Integer Overflow or Wraparound vulnerability in multiple products Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls. | 9.8 |
2016-08-07 | CVE-2016-5116 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name. | 9.1 |
2016-04-26 | CVE-2016-3074 | Incorrect Conversion between Numeric Types vulnerability in multiple products Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow. | 9.8 |