Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kpdf vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-3627
Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows malicious users to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large "number of components" value that is...
Xpdf Xpdf
7.5
CVSSv2
CVE-2005-3628
Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows malicious users to modify memory and possibly execute arbitrary code via unknown attack ve...
Xpdf Xpdf
7.5
CVSSv2
CVE-2005-3192
Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote malicious users to execute arbitrary code via a PDF file w...
Xpdf Xpdf 3.0.1
7.5
CVSSv2
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.0.4 8
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.17
Easy Software Products Cups 1.1.18
Easy Software Products Cups 1.1.4 5
Easy Software Products Cups 1.1.6
Kde Koffice 1.3.3
Kde Koffice 1.3 Beta1
Pdftohtml Pdftohtml 0.33a
Pdftohtml Pdftohtml 0.34
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
Xpdf Xpdf 2.0
Xpdf Xpdf 2.1
Ascii Ptex 3.1.4
Cstex Cstetex 2.0.2
Easy Software Products Cups 1.1.15
Easy Software Products Cups 1.1.16
Easy Software Products Cups 1.1.4 2
Easy Software Products Cups 1.1.4 3
Kde Koffice 1.3
6.8
CVSSv2
CVE-2007-0104
The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE prior to 3.5.5, (c) poppler prior to 0.5.4, and other products, allows remote malicious users to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code...
Xpdf Xpdf 3.0 Pl2
Xpdf Xpdf 3.0
Xpdf Xpdf 3.0.1
Xpdf Xpdf 3.0.1 Pl1
Xpdf Xpdf 3.0.1 Pl2
Kde Kde 3.2
Kde Kde 3.4
Kde Kde 3.4.1
Kde Kde 3.2.3
Kde Kde 3.3
Kde Kde 3.5
Kde Kde 3.2.1
Kde Kde 3.2.2
Kde Kde 3.4.2
Kde Kde 3.4.3
Kde Kde 3.3.1
Kde Kde 3.3.2
5.1
CVSSv2
CVE-2005-3191
Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and previous versions, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtm...
Xpdf Xpdf 1.0
Xpdf Xpdf 1.0a
Xpdf Xpdf 3.0 Pl2
Xpdf Xpdf 3.0 Pl3
Xpdf Xpdf 0.92
Xpdf Xpdf 0.93
Xpdf Xpdf 3.0
Xpdf Xpdf 3.0.1
Xpdf Xpdf 1.1
Xpdf Xpdf 2.0
Xpdf Xpdf 0.90
Xpdf Xpdf 0.91
Xpdf Xpdf 2.1
Xpdf Xpdf 2.2
Xpdf Xpdf 2.3
5.1
CVSSv2
CVE-2005-3193
Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and previous versions, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted malicious u...
Xpdf Xpdf 0.93
Xpdf Xpdf 1.0
Xpdf Xpdf 1.0a
Xpdf Xpdf 3.0.1
Xpdf Xpdf 3.0 Pl2
Xpdf Xpdf 0.90
Xpdf Xpdf 2.1
Xpdf Xpdf 2.2
Xpdf Xpdf 0.91
Xpdf Xpdf 0.92
Xpdf Xpdf 2.3
Xpdf Xpdf 3.0
Xpdf Xpdf 1.1
Xpdf Xpdf 2.0
Xpdf Xpdf 3.0 Pl3
5
CVSSv2
CVE-2009-1188
Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x prior to 3.02pl4 and Poppler prior to 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote malicious users to execute arbitrary code or cause a denial o...
Poppler Poppler 0.7.3
Poppler Poppler 0.3.2
Poppler Poppler 0.10.3
Poppler Poppler 0.4.0
Poppler Poppler 0.8.5
Poppler Poppler 0.9.3
Poppler Poppler 0.10.1
Poppler Poppler 0.10.0
Poppler Poppler 0.7.1
Poppler Poppler 0.6.1
Poppler Poppler 0.3.1
Poppler Poppler 0.5.2
Poppler Poppler 0.5.91
Poppler Poppler 0.6.0
Poppler Poppler 0.3.3
Poppler Poppler 0.4.2
Poppler Poppler 0.10.4
Poppler Poppler 0.9.2
Poppler Poppler 0.6.4
Poppler Poppler 0.1.2
Poppler Poppler 0.8.0
Poppler Poppler 0.8.3
5
CVSSv2
CVE-2005-3624
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows malicious users to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integ...
Kde Kdegraphics 3.2
Kde Kdegraphics 3.4.3
Sgi Propack 3.0
Tetex Tetex 1.0.7
Libextractor Libextractor
Easy Software Products Cups 1.1.23
Easy Software Products Cups 1.1.23 Rc1
Kde Kword 1.4.2
Poppler Poppler 0.4.2
Xpdf Xpdf 3.0
Conectiva Linux 10.0
Easy Software Products Cups 1.1.22
Easy Software Products Cups 1.1.22 Rc1
Kde Koffice 1.4.2
Kde Kpdf 3.2
Kde Kpdf 3.4.3
Tetex Tetex 2.0.2
Tetex Tetex 3.0
Kde Koffice 1.4
Kde Koffice 1.4.1
Tetex Tetex 2.0
Tetex Tetex 2.0.1
5
CVSSv2
CVE-2005-3626
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows malicious users to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
Easy Software Products Cups 1.1.22 Rc1
Easy Software Products Cups 1.1.23
Kde Kpdf 3.2
Kde Kpdf 3.4.3
Tetex Tetex 3.0
Xpdf Xpdf 3.0
Easy Software Products Cups 1.1.23 Rc1
Kde Kdegraphics 3.2
Kde Kword 1.4.2
Poppler Poppler 0.4.2
Conectiva Linux 10.0
Libextractor Libextractor
Kde Kdegraphics 3.4.3
Kde Koffice 1.4
Sgi Propack 3.0
Tetex Tetex 1.0.7
Easy Software Products Cups 1.1.22
Kde Koffice 1.4.1
Kde Koffice 1.4.2
Tetex Tetex 2.0
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »