Show filters
175 Total Results
Displaying 41-50 of 175
Sort by:
Attacker Value
Unknown
CVE-2022-38227
Disclosure Date: August 16, 2022 (last updated October 08, 2023)
XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp.
0
Attacker Value
Unknown
CVE-2022-33108
Disclosure Date: June 28, 2022 (last updated October 07, 2023)
XPDF v4.04 was discovered to contain a stack overflow vulnerability via the Object::Copy class of object.cc files.
0
Attacker Value
Unknown
CVE-2021-27548
Disclosure Date: May 18, 2022 (last updated October 07, 2023)
There is a Null Pointer Dereference vulnerability in the XFAScanner::scanNode() function in XFAScanner.cc in xpdf 4.03.
0
Attacker Value
Unknown
CVE-2022-30775
Disclosure Date: May 16, 2022 (last updated October 07, 2023)
xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered by (for example) sending a crafted PDF document to the pdftoppm binary. It is most easily reproduced with the DCMAKE_CXX_COMPILER=afl-clang-fast++ option.
0
Attacker Value
Unknown
CVE-2022-30524
Disclosure Date: May 09, 2022 (last updated October 07, 2023)
There is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
0
Attacker Value
Unknown
CVE-2022-27135
Disclosure Date: April 25, 2022 (last updated October 07, 2023)
xpdf 4.03 has heap buffer overflow in the function readXRefTable located in XRef.cc. An attacker can exploit this bug to cause a Denial of Service (Segmentation fault) or other unspecified effects by sending a crafted PDF file to the pdftoppm binary.
0
Attacker Value
Unknown
CVE-2022-38171
Disclosure Date: April 19, 2022 (last updated November 29, 2024)
Xpdf prior to version 4.04 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2021-30860 (Apple CoreGraphics).
0
Attacker Value
Unknown
CVE-2022-24107
Disclosure Date: April 18, 2022 (last updated November 29, 2024)
Xpdf prior to 4.04 lacked an integer overflow check in JPXStream.cc.
0
Attacker Value
Unknown
CVE-2022-24106
Disclosure Date: April 18, 2022 (last updated November 29, 2024)
In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing the 'interleaved' flag to be changed after the first scan of the image, leading to an unknown integer-related vulnerability in Stream.cc.
0
Attacker Value
Unknown
CVE-2021-30860
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
0