Show filters
175 Total Results
Displaying 41-50 of 175
Sort by:
Attacker Value
Unknown

CVE-2022-38227

Disclosure Date: August 16, 2022 (last updated October 08, 2023)
XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp.
Attacker Value
Unknown

CVE-2022-33108

Disclosure Date: June 28, 2022 (last updated October 07, 2023)
XPDF v4.04 was discovered to contain a stack overflow vulnerability via the Object::Copy class of object.cc files.
Attacker Value
Unknown

CVE-2021-27548

Disclosure Date: May 18, 2022 (last updated October 07, 2023)
There is a Null Pointer Dereference vulnerability in the XFAScanner::scanNode() function in XFAScanner.cc in xpdf 4.03.
Attacker Value
Unknown

CVE-2022-30775

Disclosure Date: May 16, 2022 (last updated October 07, 2023)
xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered by (for example) sending a crafted PDF document to the pdftoppm binary. It is most easily reproduced with the DCMAKE_CXX_COMPILER=afl-clang-fast++ option.
Attacker Value
Unknown

CVE-2022-30524

Disclosure Date: May 09, 2022 (last updated October 07, 2023)
There is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
Attacker Value
Unknown

CVE-2022-27135

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
xpdf 4.03 has heap buffer overflow in the function readXRefTable located in XRef.cc. An attacker can exploit this bug to cause a Denial of Service (Segmentation fault) or other unspecified effects by sending a crafted PDF file to the pdftoppm binary.
Attacker Value
Unknown

CVE-2022-38171

Disclosure Date: April 19, 2022 (last updated November 29, 2024)
Xpdf prior to version 4.04 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2021-30860 (Apple CoreGraphics).
Attacker Value
Unknown

CVE-2022-24107

Disclosure Date: April 18, 2022 (last updated November 29, 2024)
Xpdf prior to 4.04 lacked an integer overflow check in JPXStream.cc.
Attacker Value
Unknown

CVE-2022-24106

Disclosure Date: April 18, 2022 (last updated November 29, 2024)
In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing the 'interleaved' flag to be changed after the first scan of the image, leading to an unknown integer-related vulnerability in Stream.cc.
Attacker Value
Unknown

CVE-2021-30860

Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.