Количество 38
Количество 38

RLSA-2020:4659
Moderate: gd security update
ELSA-2020-4659
ELSA-2020-4659: gd security update (MODERATE)

openSUSE-SU-2019:1148-1
Security update for gd

openSUSE-SU-2019:1140-1
Security update for gd

SUSE-SU-2019:13961-1
Security update for php53

SUSE-SU-2019:0771-1
Security update for gd

SUSE-SU-2019:0747-1
Security update for gd

CVE-2018-14553
gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).

CVE-2018-14553
gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).

CVE-2018-14553
gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).
CVE-2018-14553
gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL point ...

openSUSE-SU-2019:0207-1
Security update for php7

SUSE-SU-2019:0333-1
Security update for php7
GHSA-jw3x-9g83-4hvr
gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing atteckers to crash an application via a specific function call sequence.

BDU:2022-05698
Уязвимость функции gdImageClone компонента gd.c графической библиотеки LibGD, позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2020:0332-1
Security update for gd

SUSE-SU-2020:0594-2
Security update for gd

SUSE-SU-2020:0594-1
Security update for gd

SUSE-SU-2020:0623-1
Security update for gd

CVE-2019-6977
gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2020:4659 Moderate: gd security update | больше 4 лет назад | ||
ELSA-2020-4659 ELSA-2020-4659: gd security update (MODERATE) | больше 4 лет назад | |||
![]() | openSUSE-SU-2019:1148-1 Security update for gd | около 6 лет назад | ||
![]() | openSUSE-SU-2019:1140-1 Security update for gd | около 6 лет назад | ||
![]() | SUSE-SU-2019:13961-1 Security update for php53 | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0771-1 Security update for gd | около 6 лет назад | ||
![]() | SUSE-SU-2019:0747-1 Security update for gd | около 6 лет назад | ||
![]() | CVE-2018-14553 gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled). | CVSS3: 7.5 | 1% Низкий | больше 5 лет назад |
![]() | CVE-2018-14553 gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled). | CVSS3: 7.4 | 1% Низкий | больше 5 лет назад |
![]() | CVE-2018-14553 gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled). | CVSS3: 7.5 | 1% Низкий | больше 5 лет назад |
CVE-2018-14553 gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL point ... | CVSS3: 7.5 | 1% Низкий | больше 5 лет назад | |
![]() | openSUSE-SU-2019:0207-1 Security update for php7 | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0333-1 Security update for php7 | больше 6 лет назад | ||
GHSA-jw3x-9g83-4hvr gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing atteckers to crash an application via a specific function call sequence. | CVSS3: 7.5 | 1% Низкий | около 3 лет назад | |
![]() | BDU:2022-05698 Уязвимость функции gdImageClone компонента gd.c графической библиотеки LibGD, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | почти 7 лет назад |
![]() | openSUSE-SU-2020:0332-1 Security update for gd | больше 5 лет назад | ||
![]() | SUSE-SU-2020:0594-2 Security update for gd | почти 5 лет назад | ||
![]() | SUSE-SU-2020:0594-1 Security update for gd | больше 5 лет назад | ||
![]() | SUSE-SU-2020:0623-1 Security update for gd | больше 5 лет назад | ||
![]() | CVE-2019-6977 gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data. | CVSS3: 8.8 | 90% Высокий | больше 6 лет назад |
Уязвимостей на страницу