Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
poppler Vendor: freedesktop

About This Product

poppler is a software product offered by freedesktop. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 88 known vulnerabilities affecting freedesktop poppler. This includes 1 critical-severity issue and 34 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2007 to 2025, indicating a sustained research interest and ongoing security attention. 52 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-3387 2007-07-30 2025-04-09 - 6.8 Likely
CVE-2010-3702 2010-11-05 2025-04-11 - 7.5 Likely
CVE-2013-1788 2013-04-09 2025-04-11 - 6.8 Likely
CVE-2013-1789 2013-04-09 2025-04-11 - 4.3 Likely
CVE-2013-1790 2013-04-09 2025-04-11 - 6.8 Likely
CVE-2013-4473 2013-11-23 2025-04-11 - 7.5 Likely
CVE-2013-4474 2013-11-23 2025-04-11 - 5.0 Likely
CVE-2013-7296 2014-01-26 2025-04-11 - 5.0 Likely
CVE-2013-4472 2014-04-22 2025-04-12 - 3.3 Unknown
CVE-2010-5110 2014-08-29 2025-04-12 - 4.3 Likely
CVE-2015-8868 2016-05-06 2025-04-12 7.8 9.3 Likely
CVE-2017-9083 2017-05-19 2025-04-20 6.5 4.3 Likely
CVE-2017-7511 2017-05-30 2025-04-20 5.5 4.3 Likely
CVE-2017-9406 2017-06-02 2025-04-20 6.5 4.3 Likely
CVE-2017-9408 2017-06-02 2025-04-20 6.5 4.3 Likely
CVE-2017-7515 2017-06-06 2025-04-20 5.5 4.3 Likely
CVE-2017-9775 2017-06-22 2025-04-20 6.5 4.3 Likely
CVE-2017-9776 2017-06-22 2025-04-20 7.8 6.8 Likely
CVE-2017-9865 2017-06-25 2025-04-20 5.5 4.3 Likely
CVE-2017-2814 2017-07-12 2025-04-20 7.5 6.8 Likely
CVE-2017-2818 2017-07-12 2025-04-20 7.5 6.8 Likely
CVE-2017-2820 2017-07-12 2025-04-20 8.8 6.8 Likely
CVE-2017-14517 2017-09-17 2025-04-20 5.5 4.3 Likely
CVE-2017-14518 2017-09-17 2025-04-20 7.8 6.8 Likely
CVE-2017-14519 2017-09-17 2025-04-20 7.5 5.0 Likely
CVE-2017-14520 2017-09-17 2025-04-20 7.8 6.8 Likely
CVE-2017-14617 2017-09-20 2025-04-20 7.8 6.8 Likely
CVE-2017-14926 2017-09-30 2025-04-20 5.5 4.3 Likely
CVE-2017-14927 2017-09-30 2025-04-20 5.5 4.3 Likely
CVE-2017-14928 2017-09-30 2025-04-20 5.5 4.3 Likely
CVE-2017-14929 2017-09-30 2025-04-20 7.5 5.0 Likely
CVE-2017-14975 2017-10-02 2025-04-20 7.5 5.0 Likely
CVE-2017-14976 2017-10-02 2025-04-20 7.5 5.0 Likely
CVE-2017-14977 2017-10-02 2025-04-20 7.5 5.0 Likely
CVE-2017-15565 2017-10-17 2025-04-20 8.8 6.8 Likely
CVE-2017-1000456 2018-01-02 2024-11-21 8.8 6.8 Likely
CVE-2018-10768 2018-05-06 2024-11-21 6.5 4.3 Likely
CVE-2017-18267 2018-05-10 2024-11-21 5.5 4.3 Likely
CVE-2018-13988 2018-07-25 2024-11-21 6.5 4.3 Likely
CVE-2018-16646 2018-09-06 2024-11-21 6.5 4.3 Likely
CVE-2018-18897 2018-11-02 2024-11-21 6.5 4.3 Likely
CVE-2018-19058 2018-11-07 2024-11-21 6.5 4.3 Likely
CVE-2018-19059 2018-11-07 2024-11-21 6.5 4.3 Likely
CVE-2018-19060 2018-11-07 2024-11-21 6.5 4.3 Likely
CVE-2018-19149 2018-11-10 2024-11-21 6.5 4.3 Likely
CVE-2018-20481 2018-12-26 2024-11-21 6.5 4.3 Likely
CVE-2018-20551 2018-12-28 2024-11-21 6.5 4.3 Likely
CVE-2018-20650 2019-01-01 2024-11-21 6.5 4.3 Likely
CVE-2018-20662 2019-01-03 2024-11-21 6.5 4.3 Likely
CVE-2019-7310 2019-02-03 2024-11-21 7.8 6.8 Likely
CVE-2019-9200 2019-02-26 2024-11-21 8.8 6.8 Likely
CVE-2019-9543 2019-03-01 2024-11-21 8.8 6.8 Likely
CVE-2019-9545 2019-03-01 2024-11-21 8.8 6.8 Likely
CVE-2019-9631 2019-03-08 2024-11-21 9.8 7.5 Likely
CVE-2019-9903 2019-03-21 2024-11-21 6.5 4.3 Likely
CVE-2019-10871 2019-04-05 2024-11-21 6.5 4.3 Likely
CVE-2019-10872 2019-04-05 2024-11-21 8.8 6.8 Likely
CVE-2019-10873 2019-04-05 2024-11-21 6.5 4.3 Likely
CVE-2019-11026 2019-04-08 2024-11-21 6.5 4.3 Likely
CVE-2019-12293 2019-05-23 2024-11-21 8.8 6.8 Likely
CVE-2019-9959 2019-07-22 2024-11-21 6.5 4.3 Likely
CVE-2019-14494 2019-08-01 2024-11-21 7.5 4.3 Likely
CVE-2018-21009 2019-09-05 2024-11-21 8.8 6.8 Likely
CVE-2010-4653 2019-11-13 2024-11-21 6.5 4.3 Likely
CVE-2010-4654 2019-11-13 2024-11-21 7.8 9.3 Likely
CVE-2012-2142 2020-01-09 2024-11-21 7.8 6.8 Likely
CVE-2020-27778 2020-12-03 2024-11-21 7.5 5.0 Likely
CVE-2020-35702 2020-12-25 2024-11-21 7.8 6.8 Likely
CVE-2021-30860 2021-08-24 2025-10-27 7.8 6.8 Likely
CVE-2022-27337 2022-05-05 2024-11-21 6.5 4.3 Likely
CVE-2022-38171 2022-08-22 2024-11-21 7.8 - -
CVE-2022-38784 2022-08-30 2024-11-21 7.8 - -
CVE-2023-34872 2023-07-31 2025-11-04 5.5 - -
CVE-2020-36023 2023-08-11 2025-11-03 6.5 - -
CVE-2020-36024 2023-08-11 2025-11-03 5.5 - -
CVE-2020-18839 2023-08-22 2024-11-21 6.5 - -
CVE-2020-23804 2023-08-22 2024-11-21 7.5 - -
CVE-2022-37050 2023-08-22 2025-11-03 6.5 - -
CVE-2022-37051 2023-08-22 2025-11-03 6.5 - -
CVE-2022-37052 2023-08-22 2025-11-03 6.5 - -
CVE-2022-38349 2023-08-22 2025-11-03 6.5 - -
CVE-2024-6239 2024-06-21 2024-11-21 7.5 - -
CVE-2024-56378 2024-12-23 2025-11-03 4.3 - -
CVE-2025-32364 2025-04-05 2025-11-03 4.0 - -
CVE-2025-32365 2025-04-05 2025-11-03 4.0 - -
CVE-2025-43903 2025-04-18 2025-10-06 4.3 - -
CVE-2025-52886 2025-07-02 2025-11-04 5.9 - -
CVE-2025-50420 2025-08-04 2025-10-09 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for freedesktop poppler by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.