Register Login
  • more
    • SaaS Solutions
      • Vulnerability Intelligence
      • Vulnerability Management
    • Pricing
    • Vulnerabilities
    • Reports
    • Blog
    • Contact Us
  1. Main
  2. Vulnerability Database
  3. Artifex Software, Inc.
  4. MuPDF
  5. 1.22.0 rc1

Known Vulnerabilities in MuPDF 1.22.0 rc1

Show more ↓
1.26.0-rc2
1.26.0-rc1
1.25.6
1.25.5
1.25.4
1.25.3
1.25.2
1.25.1
1.25.0-rc2
1.25.0-rc1
1.24.11
1.24.10
1.24.9
1.24.8
1.24.7
1.24.6
1.24.5
1.24.4
1.24.3
1.24.2
1.24.1
1.24.0-rc1
1.24.0
1.23.11
1.23.10
1.23.9
1.23.8
1.23.7
1.23.6
1.23.5
1.23.4
1.23.3
1.23.2
1.23.1
1.23.0-rc1
1.23.0
1.22.2
1.22.1
1.22.0-rc1
1.22.0
1.21.1
1.21.0-rc1
1.21.0
1.20.3
1.20.2
1.20.1
1.20.0-rc2
1.20.0-rc1
1.20.0
1.19.1
1.19.0-rc2
1.19.0-rc1
1.19.0
1.18.1
1.18.0-rc1
1.18.0
1.17.0-rc1
1.17.0
1.16.1
1.16.0-rc2
1.16.0-rc1
1.16.0
1.15.0-rc1
1.15.0
1.14.0-rc1
1.14.0
1.13.0-rc1
1.13.0
1.12.0
1.11.1
1.11rc1
1.11
1.10rc2
1.10rc1
1.10a
1.10
1.9rc2
1.9rc1
1.9a
1.9
1.8rc1
1.8
1.7rc1
1.7a
1.7
1.6
1.5
1.4rc1
1.4
1.3rc1
1.3
1.2
1.1rc1
1.1
1.0rc1
1.0
0.9
0.8.165
0.8.15
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1



Denial of service in Artifex Software mupdf27 Dec, 2024
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US
  • Russian crypto executive sentenced to prison in US for market manipulation scheme
  • ClickFix technique widely used to deliver multi-stage malware campaigns
  • Viasat reportedly affected in China-linked Salt Typhoon cyberespionage campaign
  • Silver Fox phishing campaign targets Taiwan’s government entities
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.