Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about NULL Pointer Dereference vulnerabilities in an interactive lesson.
Start learningA fix was pushed into the master
branch but not yet published.
PyMuPDF is an A high performance Python library for data extraction, analysis, conversion & manipulation of PDF (and other) documents.
Affected versions of this package are vulnerable to NULL Pointer Dereference via the break_word_for_overflow_wrap()
function when rendering a malformed EPUB document. An attacker can cause a crash by supplying a specially crafted EPUB file that triggers a null pointer dereference in the processing of FLOW_WORD
nodes.