Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tetex tetex vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3192
Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote malicious users to execute arbitrary code via a PDF file w...
Xpdf Xpdf 3.0.1
NA
CVE-2005-3191
Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and previous versions, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtm...
Xpdf Xpdf 2.0
Xpdf Xpdf 3.0 Pl3
Xpdf Xpdf 1.0
Xpdf Xpdf 0.91
Xpdf Xpdf 2.3
Xpdf Xpdf 0.92
Xpdf Xpdf 3.0.1
Xpdf Xpdf 1.0a
Xpdf Xpdf 2.2
Xpdf Xpdf 3.0 Pl2
Xpdf Xpdf 2.1
Xpdf Xpdf 0.90
Xpdf Xpdf 3.0
Xpdf Xpdf 0.93
Xpdf Xpdf 1.1
NA
CVE-2005-3193
Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and previous versions, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted malicious u...
Xpdf Xpdf 2.0
Xpdf Xpdf 3.0 Pl3
Xpdf Xpdf 1.0
Xpdf Xpdf 0.91
Xpdf Xpdf 2.3
Xpdf Xpdf 0.92
Xpdf Xpdf 3.0.1
Xpdf Xpdf 1.0a
Xpdf Xpdf 2.2
Xpdf Xpdf 3.0 Pl2
Xpdf Xpdf 2.1
Xpdf Xpdf 0.90
Xpdf Xpdf 3.0
Xpdf Xpdf 0.93
Xpdf Xpdf 1.1
NA
CVE-2005-0064
Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and previous versions allows remote malicious users to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
Xpdf Xpdf 2.0
Xpdf Xpdf 0.91a
Xpdf Xpdf 0.6
Xpdf Xpdf 1.0
Xpdf Xpdf 0.93a
Xpdf Xpdf 0.5
Xpdf Xpdf 0.80
Xpdf Xpdf 0.91
Xpdf Xpdf 0.93c
Xpdf Xpdf 0.92a
Xpdf Xpdf 0.2
Xpdf Xpdf 2.3
Xpdf Xpdf 0.92
Xpdf Xpdf 0.93b
Xpdf Xpdf 1.0a
Xpdf Xpdf 0.5a
Xpdf Xpdf 0.92c
Xpdf Xpdf 0.3
Xpdf Xpdf 0.7a
Xpdf Xpdf 0.92d
Xpdf Xpdf 2.2
Xpdf Xpdf 0.92b
NA
CVE-2005-1065
tetex in Novell Linux Desktop 9 allows local users to determine the existence of arbitrary files via a symlink attack in the /var/cache/fonts directory.
Novell Linux Desktop 9
NA
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Pdftohtml Pdftohtml 0.32a
Easy Software Products Cups 1.1.19 Rc5
Xpdf Xpdf 2.0
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.16
Xpdf Xpdf 1.0
Kde Koffice 1.3 Beta2
Sgi Propack 3.0
Easy Software Products Cups 1.1.7
Pdftohtml Pdftohtml 0.35
Xpdf Xpdf 0.91
Easy Software Products Cups 1.0.4 8
Gnome Gpdf 0.112
Kde Koffice 1.3.3
Pdftohtml Pdftohtml 0.32b
Easy Software Products Cups 1.1.15
Kde Koffice 1.3 Beta3
Gnome Gpdf 0.110
Easy Software Products Cups 1.1.13
Pdftohtml Pdftohtml 0.33a
Xpdf Xpdf 2.3
Kde Koffice 1.3
NA
CVE-2004-0886
Multiple integer overflows in libtiff 3.6.1 and previous versions allow remote malicious users to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Libtiff Libtiff 3.6.1
Wxgtk2 Wxgtk2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.2
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.1
Suse Suse Linux 9.0
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Apple Mac Os X Server 10.3.2
Apple Mac Os X 10.2.5
Trustix Secure Linux 2.0
Apple Mac Os X Server 10.2.2
Redhat Enterprise Linux Desktop 3.0
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.8
NA
CVE-2004-0888
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identifi...
Pdftohtml Pdftohtml 0.32a
Easy Software Products Cups 1.1.19 Rc5
Xpdf Xpdf 2.0
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.16
Xpdf Xpdf 1.0
Kde Koffice 1.3 Beta2
Easy Software Products Cups 1.1.7
Pdftohtml Pdftohtml 0.35
Xpdf Xpdf 0.91
Easy Software Products Cups 1.0.4 8
Gnome Gpdf 0.112
Kde Koffice 1.3.3
Pdftohtml Pdftohtml 0.32b
Easy Software Products Cups 1.1.15
Kde Koffice 1.3 Beta3
Easy Software Products Cups 1.1.13
Pdftohtml Pdftohtml 0.33a
Xpdf Xpdf 2.3
Kde Koffice 1.3
Tetex Tetex 1.0.7
Xpdf Xpdf 0.92
NA
CVE-2004-0889
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
Pdftohtml Pdftohtml 0.32a
Easy Software Products Cups 1.1.19 Rc5
Xpdf Xpdf 2.0
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.16
Xpdf Xpdf 1.0
Kde Koffice 1.3 Beta2
Easy Software Products Cups 1.1.7
Pdftohtml Pdftohtml 0.35
Xpdf Xpdf 0.91
Easy Software Products Cups 1.0.4 8
Gnome Gpdf 0.112
Kde Koffice 1.3.3
Pdftohtml Pdftohtml 0.32b
Easy Software Products Cups 1.1.15
Kde Koffice 1.3 Beta3
Easy Software Products Cups 1.1.13
Pdftohtml Pdftohtml 0.33a
Xpdf Xpdf 2.3
Kde Koffice 1.3
Tetex Tetex 1.0.7
Xpdf Xpdf 0.92
NA
CVE-2004-1125
Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitr...
Xpdf Xpdf 3.0
Easy Software Products Cups 1.1.20
Kde Kde 3.3.2
Kde Kde 3.2.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »