poppler vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the poppler package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-56378

*
  • L
CVE-2024-6239

*
  • M
Reachable Assertion

<22.12.0-2
  • M
Out-of-bounds Write

<0.85.0-2
  • M
Reachable Assertion

<22.08.0-2
  • H
Uncontrolled Recursion

<20.09.0-1
  • M
Reachable Assertion

<22.08.0-2
  • M
CVE-2022-37050

<22.08.0-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<22.08.0-2
  • M
NULL Pointer Dereference

<22.08.0-2
  • L
CVE-2023-34872

*
  • L
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

<22.08.0-2.1
  • M
CVE-2022-27337

<22.08.0-2
  • H
Access of Uninitialized Pointer

<0.85.0-2
  • L
Integer Overflow or Wraparound

<0.85.0-2
  • H
Integer Overflow or Wraparound

<0.69.0-2
  • H
Divide By Zero

<0.85.0-2
  • H
Out-of-bounds Read

<0.22.5-4
  • H
Out-of-bounds Read

<0.44.0-2
  • H
Out-of-bounds Read

<0.38.0-2
  • H
Out-of-bounds Read

<0.71.0-5
  • L
Uncontrolled Recursion

<0.85.0-2
  • L
Out-of-bounds Read

<0.71.0-5
  • L
Out-of-bounds Read

<0.85.0-2
  • L
NULL Pointer Dereference

<0.71.0-4
  • L
Divide By Zero

<0.57.0-2
  • L
Out-of-bounds Write

<0.85.0-2
  • C
Out-of-bounds Read

<0.71.0-4
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • H
Out-of-bounds Write

<0.71.0-4
  • H
Out-of-bounds Read

<0.71.0-4
  • L
Improper Input Validation

<0.71.0-4
  • L
Improper Input Validation

<0.85.0-2
  • L
Improper Input Validation

<0.71.0-4
  • L
NULL Pointer Dereference

<0.71.0-4
  • L
NULL Pointer Dereference

<0.71.0-2
  • L
NULL Pointer Dereference

<0.85.0-2
  • L
Out-of-bounds Read

<0.85.0-2
  • L
Always-Incorrect Control Flow Implementation

<0.85.0-2
  • L
Missing Release of Resource after Effective Lifetime

<0.85.0-2
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0.71.0-4
  • L
Out-of-bounds Read

<0.69.0-2
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0.16.3-1
  • L
CVE-2012-2142

<0.18.4-7
  • L
NULL Pointer Dereference

<0.16.3-1
  • L
Integer Overflow or Wraparound

<0.16.3-1
  • H
Arbitrary Code Injection

<0.16.3-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0.69.0-2
  • M
NULL Pointer Dereference

<0.38.0-2
  • H
Out-of-Bounds

<0.61.1-2
  • H
NULL Pointer Dereference

<0.61.1-2
  • L
Out-of-bounds Read

<0.61.1-2
  • L
NULL Pointer Dereference

<0.61.1-2
  • L
NULL Pointer Dereference

<0.61.1-2
  • L
NULL Pointer Dereference

<0.61.1-2
  • L
NULL Pointer Dereference

<0.61.1-2
  • L
NULL Pointer Dereference

<0.61.1-2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0.61.1-2
  • H
Improper Input Validation

<0.61.1-2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0.61.1-2
  • L
NULL Pointer Dereference

<0.61.1-2
  • L
Improper Input Validation

<0.61.1-2
  • L
Improper Input Validation

<0.61.1-2
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

<0.57.0-2
  • M
Out-of-Bounds

<0.57.0-2
  • H
Integer Overflow or Wraparound

<0.57.0-2
  • L
Uncontrolled Recursion

<0.57.0-2
  • L
Missing Release of Resource after Effective Lifetime

<0.57.0-2
  • L
Missing Release of Resource after Effective Lifetime

<0.57.0-2
  • L
NULL Pointer Dereference

<0.57.0-2
  • L
NULL Pointer Dereference

*
  • H
Out-of-Bounds

<0.38.0-3
  • M
Improper Input Validation

<0.16.3-1
  • L
Link Following

*
  • L
Improper Input Validation

<0.18.4-9
  • L
Out-of-Bounds

<0.18.4-9
  • L
Out-of-Bounds

<0.18.4-6
  • L
Out-of-Bounds

<0.18.4-6
  • M
Improper Input Validation

<0.12.4-1.2
  • M
Improper Input Validation

<0.12.4-1.2
  • H
NULL Pointer Dereference

<0.12.4-1.2
  • H
Arbitrary Code Injection

<0.5.1-1
  • L
Out-of-Bounds

<0.12.2-2.1
  • M
Numeric Errors

<0.12.2-1
  • M
Numeric Errors

<0.12.2-1
  • M
Resource Management Errors

<0.12.2-1
  • M
Numeric Errors

<0.12.2-1
  • M
Numeric Errors

<0.12.2-1
  • M
Numeric Errors

<0.12.2-1
  • M
Numeric Errors

<0.12.2-1
  • M
Numeric Errors

<0.10.6-1
  • M
Numeric Errors

<0.10.6-1
  • M
Out-of-Bounds

<0.10.6-1
  • L
Numeric Errors

<0.10.6-1
  • M
Numeric Errors

<0.10.6-1
  • M
Resource Management Errors

<0.10.6-1
  • M
Out-of-Bounds

<0.10.6-1
  • M
Out-of-Bounds

<0.10.6-1
  • M
Resource Management Errors

<0.10.6-1
  • M
Resource Management Errors

<0.10.6-1
  • M
Improper Input Validation

<0.10.6-1
  • M
Resource Management Errors

<0.10.6-1
  • L
CVE-2009-0756

<0.10.6-1
  • L
CVE-2009-0755

<0.10.6-1
  • M
Arbitrary Code Injection

<0.8.4-1.1
  • M
Improper Input Validation

<0.6.4-1
  • M
CVE-2007-4352

<0.6.2-1
  • M
Out-of-Bounds

<0.6.2-1
  • M
Out-of-Bounds

<0.6.2-1
  • M
Integer Overflow or Wraparound

<0.5.4-6.1
  • L
Improper Input Validation

<0.4.5-5.1
  • M
Out-of-Bounds

<0.4.5-1
  • M
Resource Management Errors

<0.4.3-2
  • H
Out-of-Bounds

<0.4.4-1
  • M
Numeric Errors

<0.4.4-1
  • C
Resource Management Errors

<0.4.4-1
  • M
Out-of-Bounds

<0.4.3-2
  • M
Out-of-Bounds

<0.4.2-1.1
  • M
Out-of-Bounds

<0.4.2-1.1
  • L
CVE-2005-2097

<0.4.0-1