Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gpdf vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-3387
Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler prior to 0.5.91, (2) gpdf prior to 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote malicious users to execute arbitrary code via ...
Xpdfreader Xpdf 3.02
Apple Cups
Freedesktop Poppler
Gpdf Project Gpdf
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
NA
CVE-2009-4035
The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent malicious users to execute arbitrary cod...
Kde Kpdf 3.3.1
Kde Kdegraphics 3.3.1
Xpdf Xpdf 3.0.0
Gnome Gpdf 2.8.2
NA
CVE-2006-1244
Unspecified vulnerability in certain versions of xpdf after 3.00, as used in various products including (a) pdfkit.framework, (b) gpdf, (c) pdftohtml, and (d) libextractor, has unknown impact and user-assisted attack vectors, possibly involving errors in (1) gmem.c, (2) SplashXPa...
Libextractor Libextractor 0.3.8
Libextractor Libextractor 0.3.9
Xpdf Xpdf 0.92
Xpdf Xpdf 0.93
Xpdf Xpdf 1.0
Xpdf Xpdf 3.0
Xpdf Xpdf 3.0.1
Libextractor Libextractor 0.3.6
Libextractor Libextractor 0.3.7
Xpdf Xpdf 0.90
Xpdf Xpdf 0.91
Xpdf Xpdf 2.2
Xpdf Xpdf 2.3
Libextractor Libextractor 0.4
Libextractor Libextractor 0.4.1
Xpdf Xpdf 1.0a
Xpdf Xpdf 1.1
Xpdf Xpdf 3.0.1 Pl1
Xpdf Xpdf 3.0 Pl2
Gnome Gpdf 2.8.2
Libextractor Libextractor 0.3.11
Libextractor Libextractor 0.4.2
NA
CVE-2005-2097
xpdf and kpdf do not properly validate the "loca" table in PDF files, which allows local users to cause a denial of service (disk consumption and hang) via a PDF file with a "broken" loca table, which causes a large temporary file to be created when xpdf attem...
Kde Kpdf
Xpdf Xpdf 3.0 Pl3
Xpdf Xpdf 3.0
Xpdf Xpdf 3.0 Pl2
NA
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.0.4 8
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.17
Easy Software Products Cups 1.1.18
Easy Software Products Cups 1.1.4 5
Easy Software Products Cups 1.1.6
Kde Koffice 1.3.3
Kde Koffice 1.3 Beta1
Pdftohtml Pdftohtml 0.33a
Pdftohtml Pdftohtml 0.34
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
Xpdf Xpdf 2.0
Xpdf Xpdf 2.1
Ascii Ptex 3.1.4
Cstex Cstetex 2.0.2
Easy Software Products Cups 1.1.15
Easy Software Products Cups 1.1.16
Easy Software Products Cups 1.1.4 2
Easy Software Products Cups 1.1.4 3
Kde Koffice 1.3
NA
CVE-2004-0888
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identifi...
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.12
Easy Software Products Cups 1.1.19
Easy Software Products Cups 1.1.19 Rc5
Gnome Gpdf 0.112
Gnome Gpdf 0.131
Kde Koffice 1.3 Beta3
Kde Kpdf 3.2
Pdftohtml Pdftohtml 0.36
Tetex Tetex 1.0.7
Xpdf Xpdf 1.0
Xpdf Xpdf 1.0a
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.1.15
Easy Software Products Cups 1.1.16
Easy Software Products Cups 1.1.4 2
Easy Software Products Cups 1.1.4 3
Kde Koffice 1.3.2
Kde Koffice 1.3.3
Pdftohtml Pdftohtml 0.33
Pdftohtml Pdftohtml 0.33a
Tetex Tetex 2.0.2
NA
CVE-2004-0889
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.1.12
Easy Software Products Cups 1.1.13
Easy Software Products Cups 1.1.19 Rc5
Easy Software Products Cups 1.1.20
Gnome Gpdf 0.131
Kde Koffice 1.3
Kde Kpdf 3.2
Pdftohtml Pdftohtml 0.32a
Tetex Tetex 1.0.7
Tetex Tetex 2.0
Xpdf Xpdf 1.0a
Xpdf Xpdf 1.1
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.18
Easy Software Products Cups 1.1.19
Easy Software Products Cups 1.1.7
Gnome Gpdf 0.112
Kde Koffice 1.3 Beta2
Kde Koffice 1.3 Beta3
Pdftohtml Pdftohtml 0.35
NA
CVE-2005-3192
Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote malicious users to execute arbitrary code via a PDF file w...
Xpdf Xpdf 3.0.1
NA
CVE-2005-3628
Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows malicious users to modify memory and possibly execute arbitrary code via unknown attack ve...
Xpdf Xpdf
NA
CVE-2005-3191
Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and previous versions, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtm...
Xpdf Xpdf 1.0
Xpdf Xpdf 1.0a
Xpdf Xpdf 3.0 Pl2
Xpdf Xpdf 3.0 Pl3
Xpdf Xpdf 0.92
Xpdf Xpdf 0.93
Xpdf Xpdf 3.0
Xpdf Xpdf 3.0.1
Xpdf Xpdf 1.1
Xpdf Xpdf 2.0
Xpdf Xpdf 0.90
Xpdf Xpdf 0.91
Xpdf Xpdf 2.1
Xpdf Xpdf 2.2
Xpdf Xpdf 2.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »