Количество 6
Количество 6
CVE-2026-28351
pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664.
CVE-2026-28351
pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664.
CVE-2026-28351
pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664.
CVE-2026-28351
pypdf is a free and open-source pure-python PDF library. Prior to vers ...
GHSA-f2v5-7jq9-h8cg
pypdf: Manipulated RunLengthDecode streams can exhaust RAM
BDU:2026-02550
Уязвимость библиотеки Python для работы с PDF файлами PyPDF, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю оказать воздействие на доступность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-28351 pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664. | CVSS3: 5.3 | 0% Низкий | 28 дней назад | |
CVE-2026-28351 pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664. | CVSS3: 6.5 | 0% Низкий | 28 дней назад | |
CVE-2026-28351 pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664. | CVSS3: 5.3 | 0% Низкий | 28 дней назад | |
CVE-2026-28351 pypdf is a free and open-source pure-python PDF library. Prior to vers ... | CVSS3: 5.3 | 0% Низкий | 28 дней назад | |
GHSA-f2v5-7jq9-h8cg pypdf: Manipulated RunLengthDecode streams can exhaust RAM | 0% Низкий | 28 дней назад | ||
BDU:2026-02550 Уязвимость библиотеки Python для работы с PDF файлами PyPDF, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю оказать воздействие на доступность защищаемой информации | CVSS3: 5.3 | 0% Низкий | 29 дней назад |
Уязвимостей на страницу