Search for packages
purl | pkg:alpm/archlinux/xpdf@4.00-2 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-4f2w-5h3r-aaac
Aliases: CVE-2018-7452 |
A NULL pointer dereference in JPXStream::fillReadBuf in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file, as demonstrated by pdftohtml. |
Affected by 0 other vulnerabilities. |
VCID-e3da-jf18-aaab
Aliases: CVE-2018-7455 |
An out-of-bounds read in JPXStream::readTilePart in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file, as demonstrated by pdftohtml. |
Affected by 0 other vulnerabilities. |
VCID-euhk-by2y-aaaa
Aliases: CVE-2018-7175 |
An issue was discovered in xpdf 4.00. A NULL pointer dereference in readCodestream allows an attacker to cause denial of service via a JPX image with zero components. |
Affected by 0 other vulnerabilities. |
VCID-eyva-cpym-aaah
Aliases: CVE-2018-7453 |
Infinite recursion in AcroForm::scanField in AcroForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file due to lack of loop checking, as demonstrated by pdftohtml. |
Affected by 0 other vulnerabilities. |
VCID-v4te-z5wt-aaam
Aliases: CVE-2018-7454 |
A NULL pointer dereference in XFAForm::scanFields in XFAForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file, as demonstrated by pdftohtml. |
Affected by 0 other vulnerabilities. |
VCID-wgvv-tner-aaak
Aliases: CVE-2018-7174 |
An issue was discovered in xpdf 4.00. An infinite loop in XRef::Xref allows an attacker to cause denial of service because loop detection exists only for tables, not streams. |
Affected by 0 other vulnerabilities. |
VCID-ze4x-wsez-aaaj
Aliases: CVE-2018-7173 |
A large loop in JBIG2Stream::readSymbolDictSeg in xpdf 4.00 allows an attacker to cause denial of service via a specific file due to inappropriate decoding. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:47:06.573852+00:00 | Arch Linux Importer | Affected by | VCID-ze4x-wsez-aaaj | https://security.archlinux.org/AVG-640 | 36.0.0 |
2025-03-28T07:47:06.554187+00:00 | Arch Linux Importer | Affected by | VCID-wgvv-tner-aaak | https://security.archlinux.org/AVG-640 | 36.0.0 |
2025-03-28T07:47:06.535334+00:00 | Arch Linux Importer | Affected by | VCID-euhk-by2y-aaaa | https://security.archlinux.org/AVG-640 | 36.0.0 |
2025-03-28T07:47:06.516719+00:00 | Arch Linux Importer | Affected by | VCID-4f2w-5h3r-aaac | https://security.archlinux.org/AVG-640 | 36.0.0 |
2025-03-28T07:47:06.497353+00:00 | Arch Linux Importer | Affected by | VCID-eyva-cpym-aaah | https://security.archlinux.org/AVG-640 | 36.0.0 |
2025-03-28T07:47:06.478065+00:00 | Arch Linux Importer | Affected by | VCID-v4te-z5wt-aaam | https://security.archlinux.org/AVG-640 | 36.0.0 |
2025-03-28T07:47:06.459344+00:00 | Arch Linux Importer | Affected by | VCID-e3da-jf18-aaab | https://security.archlinux.org/AVG-640 | 36.0.0 |
2024-09-18T02:02:30.490211+00:00 | Arch Linux Importer | Affected by | VCID-ze4x-wsez-aaaj | https://security.archlinux.org/AVG-640 | 34.0.1 |
2024-09-18T02:02:30.469965+00:00 | Arch Linux Importer | Affected by | VCID-wgvv-tner-aaak | https://security.archlinux.org/AVG-640 | 34.0.1 |
2024-09-18T02:02:30.449030+00:00 | Arch Linux Importer | Affected by | VCID-euhk-by2y-aaaa | https://security.archlinux.org/AVG-640 | 34.0.1 |
2024-09-18T02:02:30.428771+00:00 | Arch Linux Importer | Affected by | VCID-4f2w-5h3r-aaac | https://security.archlinux.org/AVG-640 | 34.0.1 |
2024-09-18T02:02:30.408540+00:00 | Arch Linux Importer | Affected by | VCID-eyva-cpym-aaah | https://security.archlinux.org/AVG-640 | 34.0.1 |
2024-09-18T02:02:30.388697+00:00 | Arch Linux Importer | Affected by | VCID-v4te-z5wt-aaam | https://security.archlinux.org/AVG-640 | 34.0.1 |
2024-09-18T02:02:30.367757+00:00 | Arch Linux Importer | Affected by | VCID-e3da-jf18-aaab | https://security.archlinux.org/AVG-640 | 34.0.1 |
2024-01-03T22:28:31.104022+00:00 | Arch Linux Importer | Affected by | VCID-ze4x-wsez-aaaj | https://security.archlinux.org/AVG-640 | 34.0.0rc1 |
2024-01-03T22:28:31.081971+00:00 | Arch Linux Importer | Affected by | VCID-wgvv-tner-aaak | https://security.archlinux.org/AVG-640 | 34.0.0rc1 |
2024-01-03T22:28:31.059984+00:00 | Arch Linux Importer | Affected by | VCID-euhk-by2y-aaaa | https://security.archlinux.org/AVG-640 | 34.0.0rc1 |
2024-01-03T22:28:31.037494+00:00 | Arch Linux Importer | Affected by | VCID-4f2w-5h3r-aaac | https://security.archlinux.org/AVG-640 | 34.0.0rc1 |
2024-01-03T22:28:31.012941+00:00 | Arch Linux Importer | Affected by | VCID-eyva-cpym-aaah | https://security.archlinux.org/AVG-640 | 34.0.0rc1 |
2024-01-03T22:28:30.990644+00:00 | Arch Linux Importer | Affected by | VCID-v4te-z5wt-aaam | https://security.archlinux.org/AVG-640 | 34.0.0rc1 |
2024-01-03T22:28:30.968769+00:00 | Arch Linux Importer | Affected by | VCID-e3da-jf18-aaab | https://security.archlinux.org/AVG-640 | 34.0.0rc1 |