Количество 10
Количество 10
GHSA-7xgf-6fqh-86mv
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.

CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.

CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.

CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.
CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict mark ...

BDU:2022-06890
Уязвимость функции Dict::find() компонента Dict.cc библиотеки для отображения PDF-файлов Poppler, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2022:1723-1
Security update for poppler
ELSA-2019-2713
ELSA-2019-2713: poppler security update (MODERATE)

openSUSE-SU-2021:3854-1
Security update for poppler

SUSE-SU-2021:3854-1
Security update for poppler
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-7xgf-6fqh-86mv PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | CVSS3: 6.5 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2019-9903 PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | CVSS3: 6.5 | 0% Низкий | около 6 лет назад |
![]() | CVE-2019-9903 PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | CVSS3: 3.3 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2019-9903 PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | CVSS3: 6.5 | 0% Низкий | около 6 лет назад |
CVE-2019-9903 PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict mark ... | CVSS3: 6.5 | 0% Низкий | около 6 лет назад | |
![]() | BDU:2022-06890 Уязвимость функции Dict::find() компонента Dict.cc библиотеки для отображения PDF-файлов Poppler, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | больше 6 лет назад |
![]() | SUSE-SU-2022:1723-1 Security update for poppler | около 3 лет назад | ||
ELSA-2019-2713 ELSA-2019-2713: poppler security update (MODERATE) | почти 6 лет назад | |||
![]() | openSUSE-SU-2021:3854-1 Security update for poppler | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3854-1 Security update for poppler | больше 3 лет назад |
Уязвимостей на страницу