Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2021-43308
Disclosure Date: May 29, 2022 (last updated February 23, 2025)
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function
0
Attacker Value
Unknown
CVE-2022-24614
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.
0
Attacker Value
Unknown
CVE-2022-24613
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.
0
Attacker Value
Unknown
CVE-2019-14262
Disclosure Date: July 25, 2019 (last updated November 08, 2023)
MetadataExtractor 2.1.0 allows stack consumption.
0
Attacker Value
Unknown
CVE-2018-14063
Disclosure Date: July 15, 2018 (last updated November 27, 2024)
The increaseApproval function of a smart contract implementation for Tracto (TRCT), an Ethereum ERC20 token, has an integer overflow.
0
Attacker Value
Unknown
CVE-2017-15968
Disclosure Date: October 29, 2017 (last updated November 26, 2024)
MyBuilder Clone 1.0 allows SQL Injection via the phpsqlsearch_genxml.php subcategory parameter.
0
Attacker Value
Unknown
CVE-2006-2458
Disclosure Date: May 18, 2006 (last updated October 04, 2023)
Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c).
0
Attacker Value
Unknown
CVE-2006-1244
Disclosure Date: March 15, 2006 (last updated February 22, 2025)
Unspecified vulnerability in certain versions of xpdf after 3.00, as used in various products including (a) pdfkit.framework, (b) gpdf, (c) pdftohtml, and (d) libextractor, has unknown impact and user-assisted attack vectors, possibly involving errors in (1) gmem.c, (2) SplashXPathScanner.cc, (3) JBIG2Stream.cc, (4) JPXStream.cc, and/or (5) Stream.cc. NOTE: this description is based on Debian advisory DSA 979, which is based on changes that were made after other vulnerabilities such as CVE-2006-0301 and CVE-2005-3624 through CVE-2005-3628 were fixed. Some of these newer fixes appear to be security-relevant, although it is not clear if they fix specific issues or are defensive in nature.
0
Attacker Value
Unknown
CVE-2005-3626
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
0
Attacker Value
Unknown
CVE-2005-3625
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
0