{"vulnerability": "CVE-2022-30524", "sightings": [{"uuid": "e9205049-6e5e-4747-9e3e-3be9e9ae97f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30524", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/764", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3044\n\ud83d\udd39 Description: An excessively large PDF page size (found in fuzz testing, unlikely in normal PDF files) can result in a divide-by-zero in Xpdf's text extraction code.\n\n\n\n\nThis is related to CVE-2022-30524, but the problem here is caused by a very large page size, rather than by a very large character coordinate.\n\n\n\n\ud83d\udccf Published: 2023-06-02T22:32:31.677Z\n\ud83d\udccf Modified: 2025-01-08T17:53:11.882Z\n\ud83d\udd17 References:\n1. https://www.xpdfreader.com/security-bug/CVE-2023-3044.html\n2. https://github.com/baker221/poc-xpdf", "creation_timestamp": "2025-01-08T18:18:31.000000Z"}, {"uuid": "f87ec250-a3e8-40e4-86c2-d953328c592a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30524", "type": "seen", "source": "https://t.me/cibsecurity/42210", "content": "\u203c CVE-2022-30524 \u203c\n\nThere is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-09T22:33:14.000000Z"}]}