{"id":"CVE-2019-13289","details":"In Xpdf 4.01.01, there is a use-after-free vulnerability in the function JBIG2Stream::close() located at JBIG2Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool.","modified":"2026-03-14T09:33:40.204677Z","published":"2019-07-04T22:15:10.743Z","references":[{"type":"EVIDENCE","url":"https://github.com/PanguL4b/pocs/tree/master/xpdf/heap-use-after-free_JBIG2Stream"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.01.01"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-13289.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}