Browse all 20 CVE security advisories affecting Xpdf. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Xpdf is a widely deployed suite of command-line utilities for viewing, writing, and manipulating Portable Document Format files, primarily utilized in server-side document processing pipelines. Its architecture, rooted in older C++ codebases, has historically exposed it to critical vulnerabilities, including remote code execution, buffer overflows, and use-after-free errors within PDF parsing routines. These flaws often stem from insufficient input validation and complex state management in legacy components. Security audits have identified numerous instances where crafted PDF documents could trigger arbitrary code execution or cause denial-of-service conditions. While the project maintains a focus on functionality, its age and lack of modern security-by-design principles contribute to its high vulnerability count. Administrators must treat these tools with caution, applying strict sandboxing and regular updates to mitigate risks associated with untrusted document ingestion.
This page lists every published CVE security advisory associated with Xpdf. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.