Show filters
135 Total Results
Displaying 31-40 of 135
Sort by:
Attacker Value
Unknown

CVE-2012-2142

Disclosure Date: January 09, 2020 (last updated February 21, 2025)
The error function in Error.cc in poppler before 0.21.4 allows remote attackers to execute arbitrary commands via a PDF containing an escape sequence for a terminal emulator.
Attacker Value
Unknown

CVE-2010-4654

Disclosure Date: November 13, 2019 (last updated November 27, 2024)
poppler before 0.16.3 has malformed commands that may cause corruption of the internal stack.
Attacker Value
Unknown

CVE-2010-4653

Disclosure Date: November 13, 2019 (last updated November 27, 2024)
An integer overflow condition in poppler before 0.16.3 can occur when parsing CharCodes for fonts.
Attacker Value
Unknown

CVE-2019-20367

Disclosure Date: November 13, 2019 (last updated February 21, 2025)
nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).
Attacker Value
Unknown

CVE-2018-21009

Disclosure Date: September 05, 2019 (last updated November 27, 2024)
Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc.
0
Attacker Value
Unknown

CVE-2019-14494

Disclosure Date: August 01, 2019 (last updated November 08, 2023)
An issue was discovered in Poppler through 0.78.0. There is a divide-by-zero error in the function SplashOutputDev::tilingPatternFill at SplashOutputDev.cc.
Attacker Value
Unknown

CVE-2019-9959

Disclosure Date: July 22, 2019 (last updated November 08, 2023)
The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo.
Attacker Value
Unknown

CVE-2019-12749

Disclosure Date: June 11, 2019 (last updated November 08, 2023)
dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
0
Attacker Value
Unknown

CVE-2019-12293

Disclosure Date: May 23, 2019 (last updated November 08, 2023)
In Poppler through 0.76.1, there is a heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc via data with inconsistent heights or widths.
0
Attacker Value
Unknown

CVE-2019-11026

Disclosure Date: April 08, 2019 (last updated November 08, 2023)
FontInfoScanner::scanFonts in FontInfo.cc in Poppler 0.75.0 has infinite recursion, leading to a call to the error function in Error.cc.