Lucene search

K

5 matches found

CVE
CVE
•added 2020/12/26 4:15 a.m.•356 views

CVE-2020-35376

Xpdf 4.02 allows stack consumption because of an incorrect subroutine reference in a Type 1C font charstring, related to the FoFiType1C::getOp() function.

7.5CVSS7.2AI score0.00454EPSS
CVE
CVE
•added 2020/11/21 6:15 a.m.•227 views

CVE-2020-25725

In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state) SplashOutputDev.cc:3079 is trying to use the freed t3GlyphStack->cache, which causes an heap-use-after-free problem. The codes of a previous fix for nested Type 3 characters wasn't correctly handling the case where a Type 3 char referr...

5.5CVSS6AI score0.00181EPSS
CVE
CVE
•added 2020/01/09 9:15 p.m.•60 views

CVE-2012-2142

The error function in Error.cc in poppler before 0.21.4 allows remote attackers to execute arbitrary commands via a PDF containing an escape sequence for a terminal emulator.

7.8CVSS7.8AI score0.00397EPSS
CVE
CVE
•added 2020/09/03 11:15 p.m.•43 views

CVE-2020-24999

There is an invalid memory access in the function fprintf located in Error.cc in Xpdf 4.0.2. It can be triggered by sending a crafted PDF file to the pdftohtml binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.

7.8CVSS8AI score0.00258EPSS
CVE
CVE
•added 2020/09/03 11:15 p.m.•40 views

CVE-2020-24996

There is an invalid memory access in the function TextString::~TextString() located in Catalog.cc in Xpdf 4.0.2. It can be triggered by (for example) sending a crafted pdf file to the pdftohtml binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have...

7.8CVSS8AI score0.00239EPSS