Search for packages
| purl | pkg:npm/pdfjs-dist@1.2.52 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-89es-k3ja-1be1
Aliases: CVE-2024-4367 GHSA-wgrm-67xf-hhpq |
PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF ### Impact If pdf.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain. ### Patches The patch removes the use of `eval`: https://github.com/mozilla/pdf.js/pull/18015 ### Workarounds Set the option `isEvalSupported` to `false`. ### References https://bugzilla.mozilla.org/show_bug.cgi?id=1893645 |
Affected by 0 other vulnerabilities. |
|
VCID-mfwc-dm4n-vbey
Aliases: CVE-2018-5158 GHSA-7jg2-jgv3-fmr4 |
Code injection The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||