Filter

debian/libgd2Last updated 15 November 2024

First published (updated )

libgdDouble Free

7.5
First published (updated )

libgdread_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attac…

First published (updated )

libgdIn the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiff…

8.1
First published (updated )

PHPUninitialized read in gdImageCreateFromXbm

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Ubuntu LinuxDouble Free, Use After Free

First published (updated )

PHPBuffer Overflow

8.8
First published (updated )

ubuntu/libgd2Double Free

8.8
First published (updated )

UbuntuNull Pointer Dereference, Buffer Overflow

7.5
First published (updated )

DebianDouble Free

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

libgdThe read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows r…

First published (updated )

libgdInput Validation

7.1
First published (updated )

libgdDouble Free

First published (updated )

libgdThe dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attacke…

First published (updated )

redhat/phpInteger Overflow

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/phpInput Validation

First published (updated )

libgdBuffer Overflow

First published (updated )

redhat/phpBuffer Overflow

7.5
First published (updated )

openSUSEThe read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows r…

First published (updated )

PHPBuffer Overflow, Integer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

PHPInteger Overflow, Buffer Overflow

First published (updated )

libgdThe output function in gd_gif_out.c in the GD Graphics Library (aka libgd) allows remote attackers t…

First published (updated )

libgdThe gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remo…

First published (updated )

libgdgd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a deni…

First published (updated )

PHPFixed bug (imagescale out-of-bounds read). (CVE-2013-7456)

7.6
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

PHPBuffer Overflow, Integer Overflow

8.8
First published (updated )

FreeBSD FreeBSDInteger Overflow, Buffer Overflow

8.8
First published (updated )

libgdBuffer Overflow

First published (updated )

UbuntuInput Validation

7.5
First published (updated )

redhat/phpInteger Overflow, Integer Underflow, Use After Free

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203