Search for packages
purl | pkg:alpm/archlinux/libwmf@0.2.8.4-13 |
Next non-vulnerable version | 0.2.8.4-14 |
Latest non-vulnerable version | 0.2.8.4-14 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-8571-q585-aaar
Aliases: CVE-2007-3472 |
Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact. |
Affected by 0 other vulnerabilities. |
VCID-8b7j-cce2-aaah
Aliases: CVE-2009-1364 |
Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file. |
Affected by 0 other vulnerabilities. |
VCID-9xxq-5vck-aaae
Aliases: CVE-2015-4588 |
Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file. |
Affected by 0 other vulnerabilities. |
VCID-b81w-jdrn-aaaa
Aliases: CVE-2009-3546 |
The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information. |
Affected by 0 other vulnerabilities. |
VCID-hcd8-7xx7-aaah
Aliases: CVE-2007-3473 |
The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure. |
Affected by 0 other vulnerabilities. |
VCID-m27g-my7g-aaaq
Aliases: CVE-2016-9011 |
The wmf_malloc function in api.c in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (application crash) via a crafted wmf file, which triggers a memory allocation failure. |
Affected by 0 other vulnerabilities. |
VCID-qrck-zb55-aaak
Aliases: CVE-2007-2756 |
The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng. |
Affected by 0 other vulnerabilities. |
VCID-teqa-qg7r-aaah
Aliases: CVE-2006-3376 |
Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file. |
Affected by 0 other vulnerabilities. |
VCID-u5p9-dcv9-aaad
Aliases: CVE-2015-4696 |
Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command. |
Affected by 0 other vulnerabilities. |
VCID-ue8m-k2hy-aaad
Aliases: CVE-2007-0455 |
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font. |
Affected by 0 other vulnerabilities. |
VCID-v47g-r9vz-aaaq
Aliases: CVE-2007-3477 |
The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value. |
Affected by 0 other vulnerabilities. |
VCID-z32g-xxgm-aaab
Aliases: CVE-2015-4695 |
meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file. |
Affected by 0 other vulnerabilities. |
VCID-zs3c-bdqd-aaaf
Aliases: CVE-2015-0848 |
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:45:08.207531+00:00 | Arch Linux Importer | Affected by | VCID-teqa-qg7r-aaah | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:08.173400+00:00 | Arch Linux Importer | Affected by | VCID-ue8m-k2hy-aaad | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:08.140710+00:00 | Arch Linux Importer | Affected by | VCID-qrck-zb55-aaak | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:08.107078+00:00 | Arch Linux Importer | Affected by | VCID-8571-q585-aaar | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:08.073638+00:00 | Arch Linux Importer | Affected by | VCID-hcd8-7xx7-aaah | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:08.039302+00:00 | Arch Linux Importer | Affected by | VCID-v47g-r9vz-aaaq | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:08.006305+00:00 | Arch Linux Importer | Affected by | VCID-8b7j-cce2-aaah | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:07.972739+00:00 | Arch Linux Importer | Affected by | VCID-b81w-jdrn-aaaa | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:07.940732+00:00 | Arch Linux Importer | Affected by | VCID-zs3c-bdqd-aaaf | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:07.906684+00:00 | Arch Linux Importer | Affected by | VCID-9xxq-5vck-aaae | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:07.872673+00:00 | Arch Linux Importer | Affected by | VCID-z32g-xxgm-aaab | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:07.836757+00:00 | Arch Linux Importer | Affected by | VCID-u5p9-dcv9-aaad | https://security.archlinux.org/AVG-16 | 36.0.0 |
2025-03-28T07:45:07.815873+00:00 | Arch Linux Importer | Affected by | VCID-m27g-my7g-aaaq | https://security.archlinux.org/AVG-16 | 36.0.0 |
2024-09-18T02:00:05.057878+00:00 | Arch Linux Importer | Affected by | VCID-teqa-qg7r-aaah | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:05.037264+00:00 | Arch Linux Importer | Affected by | VCID-ue8m-k2hy-aaad | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:05.016886+00:00 | Arch Linux Importer | Affected by | VCID-qrck-zb55-aaak | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.996001+00:00 | Arch Linux Importer | Affected by | VCID-8571-q585-aaar | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.976669+00:00 | Arch Linux Importer | Affected by | VCID-hcd8-7xx7-aaah | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.952828+00:00 | Arch Linux Importer | Affected by | VCID-v47g-r9vz-aaaq | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.928894+00:00 | Arch Linux Importer | Affected by | VCID-8b7j-cce2-aaah | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.908933+00:00 | Arch Linux Importer | Affected by | VCID-b81w-jdrn-aaaa | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.888731+00:00 | Arch Linux Importer | Affected by | VCID-zs3c-bdqd-aaaf | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.868619+00:00 | Arch Linux Importer | Affected by | VCID-9xxq-5vck-aaae | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.845883+00:00 | Arch Linux Importer | Affected by | VCID-z32g-xxgm-aaab | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.822735+00:00 | Arch Linux Importer | Affected by | VCID-u5p9-dcv9-aaad | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-09-18T02:00:04.799981+00:00 | Arch Linux Importer | Affected by | VCID-m27g-my7g-aaaq | https://security.archlinux.org/AVG-16 | 34.0.1 |
2024-01-03T22:26:20.006196+00:00 | Arch Linux Importer | Affected by | VCID-teqa-qg7r-aaah | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.979351+00:00 | Arch Linux Importer | Affected by | VCID-ue8m-k2hy-aaad | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.951811+00:00 | Arch Linux Importer | Affected by | VCID-qrck-zb55-aaak | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.924810+00:00 | Arch Linux Importer | Affected by | VCID-8571-q585-aaar | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.897874+00:00 | Arch Linux Importer | Affected by | VCID-hcd8-7xx7-aaah | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.875528+00:00 | Arch Linux Importer | Affected by | VCID-v47g-r9vz-aaaq | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.854244+00:00 | Arch Linux Importer | Affected by | VCID-8b7j-cce2-aaah | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.832844+00:00 | Arch Linux Importer | Affected by | VCID-b81w-jdrn-aaaa | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.811230+00:00 | Arch Linux Importer | Affected by | VCID-zs3c-bdqd-aaaf | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.787096+00:00 | Arch Linux Importer | Affected by | VCID-9xxq-5vck-aaae | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.762970+00:00 | Arch Linux Importer | Affected by | VCID-z32g-xxgm-aaab | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.736691+00:00 | Arch Linux Importer | Affected by | VCID-u5p9-dcv9-aaad | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |
2024-01-03T22:26:19.712488+00:00 | Arch Linux Importer | Affected by | VCID-m27g-my7g-aaaq | https://security.archlinux.org/AVG-16 | 34.0.0rc1 |