poppler-qt5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the poppler-qt5 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

<0:20.11.0-7.el8_8
  • M
Out-of-bounds Read

<0:20.11.0-7.el8_8
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

<0:20.11.0-13.el8_10
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

<0:20.11.0-12.el8_10
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

<0:20.11.0-11.el8
  • M
Integer Overflow or Wraparound

<0:20.11.0-6.el8
  • M
Integer Overflow or Wraparound

<0:20.11.0-6.el8
  • M
Integer Overflow or Wraparound

<0:20.11.0-6.el8
  • M
Integer Overflow or Wraparound

<0:20.11.0-6.el8
  • M
Integer Overflow or Wraparound

<0:20.11.0-6.el8
  • M
Improper Use of Validation Framework

<0:20.11.0-5.el8
  • M
Improper Use of Validation Framework

<0:20.11.0-5.el8
  • M
Improper Use of Validation Framework

<0:20.11.0-5.el8
  • M
Improper Use of Validation Framework

<0:20.11.0-5.el8
  • M
Improper Use of Validation Framework

<0:20.11.0-5.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • L
Divide By Zero

<0:0.66.0-27.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Access of Uninitialized Pointer

<0:20.11.0-2.el8
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Reachable Assertion

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Heap-based Buffer Overflow

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Out-of-bounds Read

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Resource Exhaustion

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
Integer Overflow or Wraparound

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • M
NULL Pointer Dereference

<0:0.66.0-11.el8_0.12
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Exhaustion

*