cve-2013-4474
Vulnerability from cvelistv5
Published
2013-11-23 11:00
Modified
2024-08-06 16:45
Severity ?
Summary
Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.323Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/723124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75"
          },
          {
            "name": "56567",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56567"
          },
          {
            "name": "GLSA-201401-21",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml"
          },
          {
            "name": "63374",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/63374"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434"
          },
          {
            "name": "USN-2958-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2958-1"
          },
          {
            "name": "[oss-security] 20131028 Re: CVE request: 3 vulnerabilities in poppler and 1 in Xpdf",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/10/29/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-09-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/723124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75"
        },
        {
          "name": "56567",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56567"
        },
        {
          "name": "GLSA-201401-21",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml"
        },
        {
          "name": "63374",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/63374"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434"
        },
        {
          "name": "USN-2958-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2958-1"
        },
        {
          "name": "[oss-security] 20131028 Re: CVE request: 3 vulnerabilities in poppler and 1 in Xpdf",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/10/29/1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4474",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.debian.org/723124",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/723124"
            },
            {
              "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75",
              "refsource": "CONFIRM",
              "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75"
            },
            {
              "name": "56567",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56567"
            },
            {
              "name": "GLSA-201401-21",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201401-21.xml"
            },
            {
              "name": "63374",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/63374"
            },
            {
              "name": "https://bugs.freedesktop.org/show_bug.cgi?id=69434",
              "refsource": "CONFIRM",
              "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69434"
            },
            {
              "name": "USN-2958-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2958-1"
            },
            {
              "name": "[oss-security] 20131028 Re: CVE request: 3 vulnerabilities in poppler and 1 in Xpdf",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/10/29/1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4474",
    "datePublished": "2013-11-23T11:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.323Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.24.1\", \"matchCriteriaId\": \"E1FAB528-98AD-47D3-99FB-3B1CA071704B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28BB4DC8-BCD6-44EB-BD73-C650AF47FE19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB2E8A2B-D2FC-4840-BC26-DB2A0E4DA4E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81AD541A-77B3-44D3-9442-BAD8888331B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FA68DBB-D9AE-4326-AAF4-0D8EF2594107\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"037C2903-D964-46E6-9C56-D547E6C40F0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17379F92-64FE-4956-B241-6843726C87D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84EE2328-63E4-4BF3-BBB4-C0C40E54AF43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03580443-C13D-4ABD-82A9-452EA02D7B45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1DB12DC-622F-4F28-A91D-5EC07CEB477D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BEF0F47-3F69-4DB0-A7B8-C986A430834F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9664566B-28F7-45DC-B59B-845DF2AA635E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3790BFE0-971B-46DE-B060-1D0F408F54BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C48D7A7C-0B5E-41B0-B873-0AEAD4D79034\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F8CC2DA-01A9-426C-8A43-39F35DEB4D80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8644AD8-7867-483A-B9A2-7663F53B4640\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8850C474-5EA2-4BC5-B9D1-099F8BE161EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1B9CB74-99FB-4ED2-A173-AE325CCA0890\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B4A8973-84AF-434B-B0F5-958CEAFCEFE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C6706D8-CB52-4CDA-938E-B44AAA687D94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.5.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"408E7D83-8D04-4584-AFA6-42196A6D99B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.5.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6059804F-09AF-4D66-B297-85A21E8725D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B627E11-43A6-41BE-9BD6-AD5C99B35D24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ADA618A-D673-44BF-ABFA-8EB95EEF0102\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"335FA773-87BC-440E-99BC-46805D9ADA7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F1DA1DA-94FB-41A7-BCB5-1118E5983A0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BD46429-7295-43ED-8541-7AD3CAAB2B3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A5ECCE4-7586-4EEB-9085-7D8DB49E28EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8240022B-EF85-4C18-9B47-CA7DDC125CEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3098380E-14D2-4DD4-A6A5-70F5D3A256EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B978283-552D-4573-B318-E6FDFBFAE09C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6544F688-064C-4004-A3B1-DBFEF6D3B601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50E91CA0-674F-4ECD-B58B-1CCD85A8B497\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2B1618F-71A0-4796-892A-7E1B61BB5729\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B7AD8C3-6F02-4D32-9B7C-41F865030BDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BEFD9C7-768F-4751-9242-1206A63D8E2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBC42677-F36E-4E6B-88CB-2B34E690D0ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9D05260-CE4B-4EDF-879A-E4CB0C174A33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.8.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA54F7CA-4B73-40AF-BF78-B76CA901AD44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47FC185E-9D39-491F-A1FD-F48ACC07E966\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B2CA2BF-AF2A-40AC-AAAA-5D9FA77DEB0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE791B58-693B-447C-A949-4915D08707A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66BE0E8A-4816-4530-911D-73F4E4EC7621\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"271E2F6D-5DAC-4B48-A6DC-C1BD5424D7BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2578912-1929-4CCC-B718-60279F5DD9DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8739E30F-7987-4749-926A-45B53220D95B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"907F732E-2AC2-4C66-B240-03C5B1A8BE89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.10.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36176CB9-CB8A-4B54-855D-76D0C9FFA4A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.10.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2E6F617-47EA-40A7-8140-D220F73895C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.10.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BFF932F-B15C-426C-8368-918BD5397326\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.10.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2E2EF83-C5EF-4A07-9690-D1659AB88AED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"906DB5B3-3AD3-4763-9B97-0875485701AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BF81A03-C47B-4250-BF4C-C637662876EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE65D66E-F51E-4B14-901D-8EA47C128CE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF00D9C1-07DE-43DF-8185-A06406F61ADE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6B36DB5-6D7D-475D-BD6B-AF1401C41EE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"443737A0-75DE-436D-81C0-FC94CB23F2FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F7D0BBE-D4B4-4CF2-91F1-50864DC92F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03727E0E-E5E9-40EF-B3B6-05B600F04282\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9DC337D-EBB4-403D-B32D-7B195725CD05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.13.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AEF3348-5BB0-45CB-B59B-4A90EEAAF2BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"949E12C4-97BA-4D56-B18E-4AC032834D14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40A9D590-FF77-4181-B46C-668249A9B255\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B0CC3B1-C3F6-4211-9B68-5ACD0834F8CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F4179FF-0856-4F0E-8487-3B9B94D89DBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D991BB6-38E6-4E0B-8C15-6EC5F3058DC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"379D1862-1EF5-462B-9727-D3F4E14FEB3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A60E0080-2617-40C1-8796-DDE2846546BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DC44976-236F-4796-B7B7-FFF107B44F5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47D1FC9F-4DFD-4923-9C70-0EA3A7F95F8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.14.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB53D75E-917C-4D01-960B-4E6503C19E83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.15.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2CD559C-B0FD-4ED1-AB8B-93EFB1B536FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E970BB-37CA-441C-8D2E-CAEBA1E4671A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADA83F24-7708-4751-BE4F-A33EFF77D1BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.15.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3896B9F2-83A0-40AB-A3BC-20BE0415B5F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.16.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E6C7D9F-BC8C-4C31-AC76-978E7E461571\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78CCF102-5C54-49AC-9CE5-A2E1CD062C9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF9EBACF-EE24-4991-B7D0-DCA028A699DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EE9AD76-9D5A-4EED-816F-84D12D2617BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"043A5C6F-8E1D-4B4F-9F47-8C9A331AA13A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.16.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"039CF6A6-6273-4BA7-B517-075AAA8F206D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.16.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79708E36-EBBE-43E8-918C-A006DAE59D27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.16.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DF74129-BF02-4CB2-8813-8825FA28D39B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.17.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"069D3AF1-92EB-493C-B465-AD080D16A0C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4A74B84-7805-4DB3-B589-C95A41538258\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DC0B895-B214-44F2-8552-D4CE27CA71B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B464004-B108-400A-8EF1-66C9BDDD0431\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E179689-E881-4528-BB29-F0BD41B2611C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.18.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBAEB0E8-B097-44EE-B3C2-674B2E0D880E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED35025A-5A38-4114-BE98-90665BE328A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8269E19-8D3D-4D46-BA38-5B4259279927\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DBACC6D-F45C-4E7F-AF57-5F2636BFAC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.18.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87CC490B-2653-45B2-B76E-27C58F804807\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.19.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1620ED7-17B5-42B3-A331-EA0DB4F3A73A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FA33265-F8EB-4D5F-AFCE-2DBFB6BFED62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.19.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA407987-21C8-4930-9D03-B74210490E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.19.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8192A381-A80E-4800-A85C-B799AACFE897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.19.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23516598-8E84-4092-BA33-695E7A352175\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.20.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F90CD7B-E988-4ADA-8809-9220F8309C05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.20.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"855A2B51-945A-4007-8F6A-8C198B19BC13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.20.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A8B83EE-113B-49CC-A168-ED373B8E9F85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.20.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBF9CF8-AE84-4609-9347-173D1E1D5F14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.20.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"527709DC-A1FC-47C0-AC6B-2833EF0CC277\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.20.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15A1B4BE-12A6-43DF-959C-965E75F04875\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.21.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FDFC91E-9123-4729-916F-24E62742B149\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.21.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0090ED0-AF62-4A40-85E1-5502C0E5B6D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9BEACB5-13A1-48DF-BC2A-0AF71B6671BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.21.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"154F4DAA-76BF-4948-8258-C42A0B595012\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.21.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD61DCAA-F9D3-4FD2-9712-8BA7A9A85241\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.22.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9240BEED-D541-463F-9398-94ED5D4BDE01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.22.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E33A6A0-1B2D-431F-81E1-A5262BCC74E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.22.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBC71349-603D-41CA-B3EA-B87D85655BB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.22.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EF51EEB-10F6-41A9-A1EF-AF1D451B102E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.22.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8216A541-D100-4483-9465-85A5A8F44732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.23.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C3FD3F9-923B-4FCA-AC67-E79412671842\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.23.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F49AC59-9B97-409A-8C78-5D5738AB361C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.23.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0FBA6A3-E6A7-431C-8A64-577E971A144D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.23.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795D282A-9BD3-409B-8153-1AF98FCD6EB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.23.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9416A79E-C8A7-4027-B2D5-70C2523EDDA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freedesktop:poppler:0.24.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"226369BB-7875-4F49-AF96-B6B358ED5EF8\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de formato de cadena en la funci\\u00f3n extractPages en utils/pdfseparate.cc de Poppler anterior a la versi\\u00f3n 024.2 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (ca\\u00edda) a trav\\u00e9s de especificadores de cadena en un nombre de archivo de destino.\"}]",
      "id": "CVE-2013-4474",
      "lastModified": "2024-11-21T01:55:38.467",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2013-11-23T11:55:04.663",
      "references": "[{\"url\": \"http://bugs.debian.org/723124\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/56567\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201401-21.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2013/10/29/1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/63374\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2958-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugs.freedesktop.org/show_bug.cgi?id=69434\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://bugs.debian.org/723124\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/56567\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201401-21.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2013/10/29/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/63374\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2958-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.freedesktop.org/show_bug.cgi?id=69434\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-4474\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-11-23T11:55:04.663\",\"lastModified\":\"2024-11-21T01:55:38.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de formato de cadena en la funci\u00f3n extractPages en utils/pdfseparate.cc de Poppler anterior a la versi\u00f3n 024.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de especificadores de cadena en un nombre de archivo de destino.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.24.1\",\"matchCriteriaId\":\"E1FAB528-98AD-47D3-99FB-3B1CA071704B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28BB4DC8-BCD6-44EB-BD73-C650AF47FE19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB2E8A2B-D2FC-4840-BC26-DB2A0E4DA4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81AD541A-77B3-44D3-9442-BAD8888331B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FA68DBB-D9AE-4326-AAF4-0D8EF2594107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"037C2903-D964-46E6-9C56-D547E6C40F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17379F92-64FE-4956-B241-6843726C87D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84EE2328-63E4-4BF3-BBB4-C0C40E54AF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03580443-C13D-4ABD-82A9-452EA02D7B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DB12DC-622F-4F28-A91D-5EC07CEB477D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BEF0F47-3F69-4DB0-A7B8-C986A430834F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9664566B-28F7-45DC-B59B-845DF2AA635E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3790BFE0-971B-46DE-B060-1D0F408F54BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C48D7A7C-0B5E-41B0-B873-0AEAD4D79034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8CC2DA-01A9-426C-8A43-39F35DEB4D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8644AD8-7867-483A-B9A2-7663F53B4640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8850C474-5EA2-4BC5-B9D1-099F8BE161EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1B9CB74-99FB-4ED2-A173-AE325CCA0890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4A8973-84AF-434B-B0F5-958CEAFCEFE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C6706D8-CB52-4CDA-938E-B44AAA687D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"408E7D83-8D04-4584-AFA6-42196A6D99B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.5.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6059804F-09AF-4D66-B297-85A21E8725D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B627E11-43A6-41BE-9BD6-AD5C99B35D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADA618A-D673-44BF-ABFA-8EB95EEF0102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"335FA773-87BC-440E-99BC-46805D9ADA7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F1DA1DA-94FB-41A7-BCB5-1118E5983A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD46429-7295-43ED-8541-7AD3CAAB2B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A5ECCE4-7586-4EEB-9085-7D8DB49E28EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8240022B-EF85-4C18-9B47-CA7DDC125CEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3098380E-14D2-4DD4-A6A5-70F5D3A256EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B978283-552D-4573-B318-E6FDFBFAE09C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6544F688-064C-4004-A3B1-DBFEF6D3B601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E91CA0-674F-4ECD-B58B-1CCD85A8B497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2B1618F-71A0-4796-892A-7E1B61BB5729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B7AD8C3-6F02-4D32-9B7C-41F865030BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BEFD9C7-768F-4751-9242-1206A63D8E2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC42677-F36E-4E6B-88CB-2B34E690D0ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D05260-CE4B-4EDF-879A-E4CB0C174A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA54F7CA-4B73-40AF-BF78-B76CA901AD44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47FC185E-9D39-491F-A1FD-F48ACC07E966\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B2CA2BF-AF2A-40AC-AAAA-5D9FA77DEB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE791B58-693B-447C-A949-4915D08707A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BE0E8A-4816-4530-911D-73F4E4EC7621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"271E2F6D-5DAC-4B48-A6DC-C1BD5424D7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2578912-1929-4CCC-B718-60279F5DD9DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8739E30F-7987-4749-926A-45B53220D95B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907F732E-2AC2-4C66-B240-03C5B1A8BE89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36176CB9-CB8A-4B54-855D-76D0C9FFA4A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E6F617-47EA-40A7-8140-D220F73895C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BFF932F-B15C-426C-8368-918BD5397326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E2EF83-C5EF-4A07-9690-D1659AB88AED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"906DB5B3-3AD3-4763-9B97-0875485701AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BF81A03-C47B-4250-BF4C-C637662876EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE65D66E-F51E-4B14-901D-8EA47C128CE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF00D9C1-07DE-43DF-8185-A06406F61ADE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B36DB5-6D7D-475D-BD6B-AF1401C41EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"443737A0-75DE-436D-81C0-FC94CB23F2FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F7D0BBE-D4B4-4CF2-91F1-50864DC92F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03727E0E-E5E9-40EF-B3B6-05B600F04282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9DC337D-EBB4-403D-B32D-7B195725CD05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AEF3348-5BB0-45CB-B59B-4A90EEAAF2BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"949E12C4-97BA-4D56-B18E-4AC032834D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40A9D590-FF77-4181-B46C-668249A9B255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0CC3B1-C3F6-4211-9B68-5ACD0834F8CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4179FF-0856-4F0E-8487-3B9B94D89DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D991BB6-38E6-4E0B-8C15-6EC5F3058DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"379D1862-1EF5-462B-9727-D3F4E14FEB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A60E0080-2617-40C1-8796-DDE2846546BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC44976-236F-4796-B7B7-FFF107B44F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47D1FC9F-4DFD-4923-9C70-0EA3A7F95F8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB53D75E-917C-4D01-960B-4E6503C19E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2CD559C-B0FD-4ED1-AB8B-93EFB1B536FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E970BB-37CA-441C-8D2E-CAEBA1E4671A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA83F24-7708-4751-BE4F-A33EFF77D1BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896B9F2-83A0-40AB-A3BC-20BE0415B5F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E6C7D9F-BC8C-4C31-AC76-978E7E461571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78CCF102-5C54-49AC-9CE5-A2E1CD062C9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9EBACF-EE24-4991-B7D0-DCA028A699DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE9AD76-9D5A-4EED-816F-84D12D2617BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"043A5C6F-8E1D-4B4F-9F47-8C9A331AA13A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"039CF6A6-6273-4BA7-B517-075AAA8F206D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79708E36-EBBE-43E8-918C-A006DAE59D27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DF74129-BF02-4CB2-8813-8825FA28D39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"069D3AF1-92EB-493C-B465-AD080D16A0C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4A74B84-7805-4DB3-B589-C95A41538258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC0B895-B214-44F2-8552-D4CE27CA71B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B464004-B108-400A-8EF1-66C9BDDD0431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E179689-E881-4528-BB29-F0BD41B2611C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBAEB0E8-B097-44EE-B3C2-674B2E0D880E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED35025A-5A38-4114-BE98-90665BE328A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8269E19-8D3D-4D46-BA38-5B4259279927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DBACC6D-F45C-4E7F-AF57-5F2636BFAC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87CC490B-2653-45B2-B76E-27C58F804807\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1620ED7-17B5-42B3-A331-EA0DB4F3A73A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA33265-F8EB-4D5F-AFCE-2DBFB6BFED62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA407987-21C8-4930-9D03-B74210490E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8192A381-A80E-4800-A85C-B799AACFE897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23516598-8E84-4092-BA33-695E7A352175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F90CD7B-E988-4ADA-8809-9220F8309C05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855A2B51-945A-4007-8F6A-8C198B19BC13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8B83EE-113B-49CC-A168-ED373B8E9F85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBF9CF8-AE84-4609-9347-173D1E1D5F14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"527709DC-A1FC-47C0-AC6B-2833EF0CC277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15A1B4BE-12A6-43DF-959C-965E75F04875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FDFC91E-9123-4729-916F-24E62742B149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0090ED0-AF62-4A40-85E1-5502C0E5B6D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9BEACB5-13A1-48DF-BC2A-0AF71B6671BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"154F4DAA-76BF-4948-8258-C42A0B595012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD61DCAA-F9D3-4FD2-9712-8BA7A9A85241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9240BEED-D541-463F-9398-94ED5D4BDE01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E33A6A0-1B2D-431F-81E1-A5262BCC74E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC71349-603D-41CA-B3EA-B87D85655BB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF51EEB-10F6-41A9-A1EF-AF1D451B102E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8216A541-D100-4483-9465-85A5A8F44732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C3FD3F9-923B-4FCA-AC67-E79412671842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F49AC59-9B97-409A-8C78-5D5738AB361C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FBA6A3-E6A7-431C-8A64-577E971A144D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795D282A-9BD3-409B-8153-1AF98FCD6EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9416A79E-C8A7-4027-B2D5-70C2523EDDA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:0.24.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"226369BB-7875-4F49-AF96-B6B358ED5EF8\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/723124\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/56567\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201401-21.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/10/29/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/63374\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2958-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugs.freedesktop.org/show_bug.cgi?id=69434\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://bugs.debian.org/723124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://cgit.freedesktop.org/poppler/poppler/commit/?id=61f79b8447c3ac8ab5a26e79e0c28053ffdccf75\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/56567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201401-21.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/10/29/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/63374\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2958-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.freedesktop.org/show_bug.cgi?id=69434\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.