Количество 10
Количество 10
GHSA-7xgf-6fqh-86mv
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.
CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.
CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.
CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.
CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict mark ...
BDU:2022-06890
Уязвимость функции Dict::find() компонента Dict.cc библиотеки для отображения PDF-файлов Poppler, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2022:1723-1
Security update for poppler
ELSA-2019-2713
ELSA-2019-2713: poppler security update (MODERATE)
openSUSE-SU-2021:3854-1
Security update for poppler
SUSE-SU-2021:3854-1
Security update for poppler
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-7xgf-6fqh-86mv PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | CVSS3: 6.5 | 1% Низкий | больше 3 лет назад | |
CVE-2019-9903 PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-9903 PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | CVSS3: 3.3 | 1% Низкий | больше 6 лет назад | |
CVE-2019-9903 PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-9903 PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict mark ... | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
BDU:2022-06890 Уязвимость функции Dict::find() компонента Dict.cc библиотеки для отображения PDF-файлов Poppler, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
SUSE-SU-2022:1723-1 Security update for poppler | больше 3 лет назад | |||
ELSA-2019-2713 ELSA-2019-2713: poppler security update (MODERATE) | около 6 лет назад | |||
openSUSE-SU-2021:3854-1 Security update for poppler | почти 4 года назад | |||
SUSE-SU-2021:3854-1 Security update for poppler | почти 4 года назад |
Уязвимостей на страницу