Filtered by vendor Gd Graphics Library
Subscriptions
Filtered by product Gdlib
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2004-0990 | 6 Gd Graphics Library, Gentoo, Openpkg and 3 more | 6 Gdlib, Linux, Openpkg and 3 more | 2024-08-08 | N/A |
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941. | ||||
CVE-2004-0941 | 3 Gd Graphics Library, Redhat, Trustix | 3 Gdlib, Enterprise Linux, Secure Linux | 2024-08-08 | N/A |
Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990. | ||||
CVE-2007-3476 | 2 Gd Graphics Library, Redhat | 2 Gdlib, Enterprise Linux | 2024-08-07 | N/A |
Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault. | ||||
CVE-2007-3475 | 2 Gd Graphics Library, Redhat | 2 Gdlib, Enterprise Linux | 2024-08-07 | N/A |
The GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via a GIF image that has no global color map. | ||||
CVE-2007-3478 | 1 Gd Graphics Library | 1 Gdlib | 2024-08-07 | N/A |
Race condition in gdImageStringFTEx (gdft_draw_bitmap) in gdft.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors, possibly involving truetype font (TTF) support. |
Page 1 of 1.