Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libextractor@0.5.16-2
Typedeb
Namespacedebian
Namelibextractor
Version0.5.16-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:1.11-2
Latest_non_vulnerable_version1:1.11-2
Affected_by_vulnerabilities
0
url VCID-1xdm-2dj5-jkc7
vulnerability_id VCID-1xdm-2dj5-jkc7
summary security update
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14347
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68494
published_at 2026-04-16T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68456
published_at 2026-04-13T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68392
published_at 2026-04-01T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68412
published_at 2026-04-02T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68432
published_at 2026-04-04T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68408
published_at 2026-04-07T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68459
published_at 2026-04-08T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-09T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68501
published_at 2026-04-11T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68489
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14347
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
5
reference_url https://gnunet.org/bugs/view.php?id=5399
reference_id
reference_type
scores
url https://gnunet.org/bugs/view.php?id=5399
6
reference_url https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394
7
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
8
reference_url https://www.debian.org/security/2018/dsa-4290
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4290
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904905
reference_id 904905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904905
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14347
reference_id CVE-2018-14347
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14347
14
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-14347
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xdm-2dj5-jkc7
1
url VCID-2auw-wc6u-ekcs
vulnerability_id VCID-2auw-wc6u-ekcs
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20431
reference_id
reference_type
scores
0
value 0.00572
scoring_system epss
scoring_elements 0.6866
published_at 2026-04-13T12:55:00Z
1
value 0.00572
scoring_system epss
scoring_elements 0.68689
published_at 2026-04-12T12:55:00Z
2
value 0.00572
scoring_system epss
scoring_elements 0.68597
published_at 2026-04-01T12:55:00Z
3
value 0.00572
scoring_system epss
scoring_elements 0.68615
published_at 2026-04-02T12:55:00Z
4
value 0.00572
scoring_system epss
scoring_elements 0.68633
published_at 2026-04-04T12:55:00Z
5
value 0.00572
scoring_system epss
scoring_elements 0.6861
published_at 2026-04-07T12:55:00Z
6
value 0.00572
scoring_system epss
scoring_elements 0.68661
published_at 2026-04-08T12:55:00Z
7
value 0.00572
scoring_system epss
scoring_elements 0.68679
published_at 2026-04-09T12:55:00Z
8
value 0.00572
scoring_system epss
scoring_elements 0.68703
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20431
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
3
reference_url https://gnunet.org/bugs/view.php?id=5494
reference_id
reference_type
scores
url https://gnunet.org/bugs/view.php?id=5494
4
reference_url https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7
5
reference_url https://gnunet.org/git/libextractor.git/tree/ChangeLog
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/tree/ChangeLog
6
reference_url https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
7
reference_url https://www.debian.org/security/2018/dsa-4361
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4361
8
reference_url http://www.securityfocus.com/bid/106300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106300
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917213
reference_id 917213
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917213
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20431
reference_id CVE-2018-20431
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20431
14
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-20431
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2auw-wc6u-ekcs
2
url VCID-3bg1-rwze-kuhw
vulnerability_id VCID-3bg1-rwze-kuhw
summary In GNU Libextractor 1.4, there is a heap-based buffer overflow in the EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related to processiTXt and stndup.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15601
reference_id
reference_type
scores
0
value 0.00432
scoring_system epss
scoring_elements 0.62734
published_at 2026-04-16T12:55:00Z
1
value 0.00432
scoring_system epss
scoring_elements 0.62695
published_at 2026-04-13T12:55:00Z
2
value 0.00432
scoring_system epss
scoring_elements 0.62587
published_at 2026-04-01T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62645
published_at 2026-04-02T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62677
published_at 2026-04-04T12:55:00Z
5
value 0.00432
scoring_system epss
scoring_elements 0.62642
published_at 2026-04-07T12:55:00Z
6
value 0.00432
scoring_system epss
scoring_elements 0.62694
published_at 2026-04-08T12:55:00Z
7
value 0.00432
scoring_system epss
scoring_elements 0.6271
published_at 2026-04-09T12:55:00Z
8
value 0.00432
scoring_system epss
scoring_elements 0.62729
published_at 2026-04-11T12:55:00Z
9
value 0.00432
scoring_system epss
scoring_elements 0.62718
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15601
3
reference_url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
reference_id
reference_type
scores
url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
4
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15601
reference_id CVE-2017-15601
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15601
7
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15601
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bg1-rwze-kuhw
3
url VCID-5ymr-xk84-8uh3
vulnerability_id VCID-5ymr-xk84-8uh3
summary In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted size.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15602
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61235
published_at 2026-04-16T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.61195
published_at 2026-04-13T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61073
published_at 2026-04-01T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61151
published_at 2026-04-02T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61179
published_at 2026-04-04T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.61144
published_at 2026-04-07T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61192
published_at 2026-04-08T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61207
published_at 2026-04-09T12:55:00Z
8
value 0.00408
scoring_system epss
scoring_elements 0.61227
published_at 2026-04-11T12:55:00Z
9
value 0.00408
scoring_system epss
scoring_elements 0.61214
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15602
3
reference_url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
reference_id
reference_type
scores
url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
4
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15602
reference_id CVE-2017-15602
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15602
7
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15602
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ymr-xk84-8uh3
4
url VCID-ahs6-mesc-yqhm
vulnerability_id VCID-ahs6-mesc-yqhm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20430
reference_id
reference_type
scores
0
value 0.0057
scoring_system epss
scoring_elements 0.68644
published_at 2026-04-16T12:55:00Z
1
value 0.0057
scoring_system epss
scoring_elements 0.68605
published_at 2026-04-13T12:55:00Z
2
value 0.0057
scoring_system epss
scoring_elements 0.68539
published_at 2026-04-01T12:55:00Z
3
value 0.0057
scoring_system epss
scoring_elements 0.68557
published_at 2026-04-02T12:55:00Z
4
value 0.0057
scoring_system epss
scoring_elements 0.68575
published_at 2026-04-04T12:55:00Z
5
value 0.0057
scoring_system epss
scoring_elements 0.68553
published_at 2026-04-07T12:55:00Z
6
value 0.0057
scoring_system epss
scoring_elements 0.68604
published_at 2026-04-08T12:55:00Z
7
value 0.0057
scoring_system epss
scoring_elements 0.68622
published_at 2026-04-09T12:55:00Z
8
value 0.0057
scoring_system epss
scoring_elements 0.68647
published_at 2026-04-11T12:55:00Z
9
value 0.0057
scoring_system epss
scoring_elements 0.68634
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20430
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
3
reference_url https://gnunet.org/bugs/view.php?id=5493
reference_id
reference_type
scores
url https://gnunet.org/bugs/view.php?id=5493
4
reference_url https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110
5
reference_url https://gnunet.org/git/libextractor.git/tree/ChangeLog
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/tree/ChangeLog
6
reference_url https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
7
reference_url https://www.debian.org/security/2018/dsa-4361
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4361
8
reference_url http://www.securityfocus.com/bid/106300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106300
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917214
reference_id 917214
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917214
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20430
reference_id CVE-2018-20430
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20430
14
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-20430
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahs6-mesc-yqhm
5
url VCID-bdsg-x852-wfgn
vulnerability_id VCID-bdsg-x852-wfgn
summary GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17440
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.67284
published_at 2026-04-16T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67298
published_at 2026-04-11T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.67249
published_at 2026-04-13T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.67278
published_at 2026-04-09T12:55:00Z
4
value 0.01003
scoring_system epss
scoring_elements 0.77005
published_at 2026-04-08T12:55:00Z
5
value 0.01003
scoring_system epss
scoring_elements 0.76973
published_at 2026-04-07T12:55:00Z
6
value 0.01003
scoring_system epss
scoring_elements 0.76962
published_at 2026-04-02T12:55:00Z
7
value 0.01003
scoring_system epss
scoring_elements 0.76991
published_at 2026-04-04T12:55:00Z
8
value 0.01003
scoring_system epss
scoring_elements 0.76956
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17440
1
reference_url https://bugs.debian.org/883528#35
reference_id
reference_type
scores
url https://bugs.debian.org/883528#35
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17440
3
reference_url https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e
4
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html
5
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html
6
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html
7
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html
8
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html
9
reference_url http://www.securityfocus.com/bid/102116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102116
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883528
reference_id 883528
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883528
11
reference_url https://security.archlinux.org/ASA-201807-16
reference_id ASA-201807-16
reference_type
scores
url https://security.archlinux.org/ASA-201807-16
12
reference_url https://security.archlinux.org/AVG-541
reference_id AVG-541
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-541
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17440
reference_id CVE-2017-17440
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17440
15
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-17440
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdsg-x852-wfgn
6
url VCID-kpcg-4av4-gka8
vulnerability_id VCID-kpcg-4av4-gka8
summary security update
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00001.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14346
reference_id
reference_type
scores
0
value 0.00496
scoring_system epss
scoring_elements 0.65847
published_at 2026-04-16T12:55:00Z
1
value 0.00496
scoring_system epss
scoring_elements 0.65814
published_at 2026-04-13T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.6573
published_at 2026-04-01T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.6578
published_at 2026-04-02T12:55:00Z
4
value 0.00496
scoring_system epss
scoring_elements 0.65809
published_at 2026-04-04T12:55:00Z
5
value 0.00496
scoring_system epss
scoring_elements 0.65774
published_at 2026-04-07T12:55:00Z
6
value 0.00496
scoring_system epss
scoring_elements 0.65827
published_at 2026-04-08T12:55:00Z
7
value 0.00496
scoring_system epss
scoring_elements 0.65838
published_at 2026-04-09T12:55:00Z
8
value 0.00496
scoring_system epss
scoring_elements 0.65857
published_at 2026-04-11T12:55:00Z
9
value 0.00496
scoring_system epss
scoring_elements 0.65844
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14346
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
5
reference_url https://gnunet.org/git/libextractor.git/commit/?id=ad19e7fe0adc99d5710eff1ed48d91a7b75a950e
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=ad19e7fe0adc99d5710eff1ed48d91a7b75a950e
6
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
7
reference_url https://www.debian.org/security/2018/dsa-4290
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4290
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904903
reference_id 904903
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904903
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14346
reference_id CVE-2018-14346
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14346
13
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-14346
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcg-4av4-gka8
7
url VCID-kxcz-d7a4-77e8
vulnerability_id VCID-kxcz-d7a4-77e8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16430
reference_id
reference_type
scores
0
value 0.01358
scoring_system epss
scoring_elements 0.80098
published_at 2026-04-01T12:55:00Z
1
value 0.01358
scoring_system epss
scoring_elements 0.80105
published_at 2026-04-02T12:55:00Z
2
value 0.01358
scoring_system epss
scoring_elements 0.80125
published_at 2026-04-04T12:55:00Z
3
value 0.01358
scoring_system epss
scoring_elements 0.80113
published_at 2026-04-07T12:55:00Z
4
value 0.01358
scoring_system epss
scoring_elements 0.80141
published_at 2026-04-08T12:55:00Z
5
value 0.01358
scoring_system epss
scoring_elements 0.80148
published_at 2026-04-09T12:55:00Z
6
value 0.01358
scoring_system epss
scoring_elements 0.80167
published_at 2026-04-11T12:55:00Z
7
value 0.01358
scoring_system epss
scoring_elements 0.80151
published_at 2026-04-12T12:55:00Z
8
value 0.01358
scoring_system epss
scoring_elements 0.80143
published_at 2026-04-13T12:55:00Z
9
value 0.01358
scoring_system epss
scoring_elements 0.80173
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16430
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907987
reference_id 907987
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907987
5
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-16430
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxcz-d7a4-77e8
8
url VCID-tc8j-82se-qfbk
vulnerability_id VCID-tc8j-82se-qfbk
summary In GNU Libextractor 1.4, there is an out-of-bounds read in the EXTRACTOR_dvi_extract_method function in plugins/dvi_extractor.c.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15922
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39284
published_at 2026-04-16T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.39249
published_at 2026-04-12T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39231
published_at 2026-04-13T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39077
published_at 2026-04-01T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39262
published_at 2026-04-02T12:55:00Z
5
value 0.00177
scoring_system epss
scoring_elements 0.39286
published_at 2026-04-04T12:55:00Z
6
value 0.00177
scoring_system epss
scoring_elements 0.39204
published_at 2026-04-07T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.39259
published_at 2026-04-08T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39275
published_at 2026-04-09T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39287
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15922
3
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
4
reference_url http://www.securityfocus.com/bid/101595
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101595
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880016
reference_id 880016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880016
6
reference_url https://security.archlinux.org/ASA-201711-16
reference_id ASA-201711-16
reference_type
scores
url https://security.archlinux.org/ASA-201711-16
7
reference_url https://security.archlinux.org/AVG-471
reference_id AVG-471
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-471
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15922
reference_id CVE-2017-15922
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15922
10
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15922
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8j-82se-qfbk
9
url VCID-tubv-28uu-2uh8
vulnerability_id VCID-tubv-28uu-2uh8
summary GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15531
reference_id
reference_type
scores
0
value 0.01106
scoring_system epss
scoring_elements 0.78129
published_at 2026-04-16T12:55:00Z
1
value 0.01106
scoring_system epss
scoring_elements 0.78094
published_at 2026-04-13T12:55:00Z
2
value 0.01106
scoring_system epss
scoring_elements 0.78038
published_at 2026-04-01T12:55:00Z
3
value 0.01106
scoring_system epss
scoring_elements 0.78047
published_at 2026-04-02T12:55:00Z
4
value 0.01106
scoring_system epss
scoring_elements 0.78076
published_at 2026-04-04T12:55:00Z
5
value 0.01106
scoring_system epss
scoring_elements 0.78058
published_at 2026-04-07T12:55:00Z
6
value 0.01106
scoring_system epss
scoring_elements 0.78084
published_at 2026-04-08T12:55:00Z
7
value 0.01106
scoring_system epss
scoring_elements 0.78089
published_at 2026-04-09T12:55:00Z
8
value 0.01106
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-11T12:55:00Z
9
value 0.01106
scoring_system epss
scoring_elements 0.78097
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15531
1
reference_url https://bugs.gnunet.org/view.php?id=5846
reference_id
reference_type
scores
url https://bugs.gnunet.org/view.php?id=5846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15531
3
reference_url https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html
4
reference_url https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935553
reference_id 935553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935553
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15531
reference_id CVE-2019-15531
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15531
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.11-2
purl pkg:deb/debian/libextractor@1:1.11-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.11-2
aliases CVE-2019-15531
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tubv-28uu-2uh8
10
url VCID-x3k6-yrp9-9ud9
vulnerability_id VCID-x3k6-yrp9-9ud9
summary In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00003.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00003.html
1
reference_url http://openwall.com/lists/oss-security/2017/10/11/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/10/11/1
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15267
reference_id
reference_type
scores
0
value 0.0066
scoring_system epss
scoring_elements 0.71141
published_at 2026-04-16T12:55:00Z
1
value 0.0066
scoring_system epss
scoring_elements 0.71095
published_at 2026-04-13T12:55:00Z
2
value 0.0066
scoring_system epss
scoring_elements 0.71047
published_at 2026-04-01T12:55:00Z
3
value 0.0066
scoring_system epss
scoring_elements 0.71056
published_at 2026-04-02T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71074
published_at 2026-04-04T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71048
published_at 2026-04-07T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.71091
published_at 2026-04-08T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.71103
published_at 2026-04-09T12:55:00Z
8
value 0.0066
scoring_system epss
scoring_elements 0.71126
published_at 2026-04-11T12:55:00Z
9
value 0.0066
scoring_system epss
scoring_elements 0.71112
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15267
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499600
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15267
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15267
5
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
6
reference_url http://www.securityfocus.com/bid/101272
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101272
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
reference_id 878314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15267
reference_id CVE-2017-15267
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15267
10
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15267
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3k6-yrp9-9ud9
11
url VCID-xyab-d3gr-zkdw
vulnerability_id VCID-xyab-d3gr-zkdw
summary In GNU Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in wav_extractor.c via a zero sample rate.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00002.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00002.html
1
reference_url http://openwall.com/lists/oss-security/2017/10/11/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/10/11/1
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15266
reference_id
reference_type
scores
0
value 0.00363
scoring_system epss
scoring_elements 0.58456
published_at 2026-04-16T12:55:00Z
1
value 0.00363
scoring_system epss
scoring_elements 0.58424
published_at 2026-04-13T12:55:00Z
2
value 0.00363
scoring_system epss
scoring_elements 0.58308
published_at 2026-04-01T12:55:00Z
3
value 0.00363
scoring_system epss
scoring_elements 0.58393
published_at 2026-04-02T12:55:00Z
4
value 0.00363
scoring_system epss
scoring_elements 0.58413
published_at 2026-04-04T12:55:00Z
5
value 0.00363
scoring_system epss
scoring_elements 0.58387
published_at 2026-04-07T12:55:00Z
6
value 0.00363
scoring_system epss
scoring_elements 0.5844
published_at 2026-04-08T12:55:00Z
7
value 0.00363
scoring_system epss
scoring_elements 0.58446
published_at 2026-04-09T12:55:00Z
8
value 0.00363
scoring_system epss
scoring_elements 0.58463
published_at 2026-04-11T12:55:00Z
9
value 0.00363
scoring_system epss
scoring_elements 0.58443
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15266
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499599
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499599
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15266
5
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
6
reference_url http://www.securityfocus.com/bid/101271
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101271
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
reference_id 878314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15266
reference_id CVE-2017-15266
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15266
10
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15266
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyab-d3gr-zkdw
12
url VCID-xzye-g5rw-fyh5
vulnerability_id VCID-xzye-g5rw-fyh5
summary
Multiple vulnerabilities have been found in GraphicsMagick,
    allowing remote attackers to execute arbitrary code or cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3736
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26117
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26198
published_at 2026-04-02T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.2624
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26012
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26078
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.2613
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26139
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31157
published_at 2026-04-12T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31113
published_at 2026-04-13T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31146
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=537941
reference_id 537941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=537941
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797
reference_id 559797
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801
reference_id 559801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806
reference_id 559806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809
reference_id 559809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811
reference_id 559811
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814
reference_id 559814
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815
reference_id 559815
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816
reference_id 559816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819
reference_id 559819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822
reference_id 559822
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824
reference_id 559824
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825
reference_id 559825
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826
reference_id 559826
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829
reference_id 559829
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831
reference_id 559831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832
reference_id 559832
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833
reference_id 559833
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834
reference_id 559834
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835
reference_id 559835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836
reference_id 559836
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837
reference_id 559837
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840
reference_id 559840
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844
reference_id 559844
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845
reference_id 559845
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436
reference_id 702436
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436
29
reference_url https://security.gentoo.org/glsa/201311-10
reference_id GLSA-201311-10
reference_type
scores
url https://security.gentoo.org/glsa/201311-10
30
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
31
reference_url https://access.redhat.com/errata/RHSA-2009:1646
reference_id RHSA-2009:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1646
32
reference_url https://access.redhat.com/errata/RHSA-2010:0039
reference_id RHSA-2010:0039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0039
fixed_packages
0
url pkg:deb/debian/libextractor@1:0.5.23%2Bdfsg-7
purl pkg:deb/debian/libextractor@1:0.5.23%2Bdfsg-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:0.5.23%252Bdfsg-7
aliases CVE-2009-3736
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzye-g5rw-fyh5
13
url VCID-zd6d-q8xx-zud6
vulnerability_id VCID-zd6d-q8xx-zud6
summary In GNU Libextractor 1.4, there is a NULL Pointer Dereference in the EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15600
reference_id
reference_type
scores
0
value 0.01659
scoring_system epss
scoring_elements 0.82093
published_at 2026-04-16T12:55:00Z
1
value 0.01659
scoring_system epss
scoring_elements 0.82058
published_at 2026-04-13T12:55:00Z
2
value 0.01659
scoring_system epss
scoring_elements 0.81993
published_at 2026-04-01T12:55:00Z
3
value 0.01659
scoring_system epss
scoring_elements 0.82005
published_at 2026-04-02T12:55:00Z
4
value 0.01659
scoring_system epss
scoring_elements 0.82027
published_at 2026-04-04T12:55:00Z
5
value 0.01659
scoring_system epss
scoring_elements 0.82022
published_at 2026-04-07T12:55:00Z
6
value 0.01659
scoring_system epss
scoring_elements 0.82049
published_at 2026-04-08T12:55:00Z
7
value 0.01659
scoring_system epss
scoring_elements 0.82056
published_at 2026-04-09T12:55:00Z
8
value 0.01659
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-11T12:55:00Z
9
value 0.01659
scoring_system epss
scoring_elements 0.82066
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15600
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1501695
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1501695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15600
4
reference_url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
reference_id
reference_type
scores
url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
5
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15600
reference_id CVE-2017-15600
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15600
8
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15600
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zd6d-q8xx-zud6
Fixing_vulnerabilities
0
url VCID-1z9b-trb7-2ubp
vulnerability_id VCID-1z9b-trb7-2ubp
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
4
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0177.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0177.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3626
reference_id
reference_type
scores
0
value 0.09332
scoring_system epss
scoring_elements 0.92772
published_at 2026-04-16T12:55:00Z
1
value 0.09332
scoring_system epss
scoring_elements 0.92732
published_at 2026-04-01T12:55:00Z
2
value 0.09332
scoring_system epss
scoring_elements 0.92739
published_at 2026-04-02T12:55:00Z
3
value 0.09332
scoring_system epss
scoring_elements 0.92745
published_at 2026-04-04T12:55:00Z
4
value 0.09332
scoring_system epss
scoring_elements 0.92742
published_at 2026-04-07T12:55:00Z
5
value 0.09332
scoring_system epss
scoring_elements 0.92752
published_at 2026-04-08T12:55:00Z
6
value 0.09332
scoring_system epss
scoring_elements 0.92756
published_at 2026-04-09T12:55:00Z
7
value 0.09332
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-11T12:55:00Z
8
value 0.09332
scoring_system epss
scoring_elements 0.92761
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3626
8
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
10
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
11
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
12
reference_url http://secunia.com/advisories/18312
reference_id
reference_type
scores
url http://secunia.com/advisories/18312
13
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
14
reference_url http://secunia.com/advisories/18329
reference_id
reference_type
scores
url http://secunia.com/advisories/18329
15
reference_url http://secunia.com/advisories/18332
reference_id
reference_type
scores
url http://secunia.com/advisories/18332
16
reference_url http://secunia.com/advisories/18334
reference_id
reference_type
scores
url http://secunia.com/advisories/18334
17
reference_url http://secunia.com/advisories/18335
reference_id
reference_type
scores
url http://secunia.com/advisories/18335
18
reference_url http://secunia.com/advisories/18338
reference_id
reference_type
scores
url http://secunia.com/advisories/18338
19
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
20
reference_url http://secunia.com/advisories/18373
reference_id
reference_type
scores
url http://secunia.com/advisories/18373
21
reference_url http://secunia.com/advisories/18375
reference_id
reference_type
scores
url http://secunia.com/advisories/18375
22
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
23
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
24
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
25
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
26
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
27
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
28
reference_url http://secunia.com/advisories/18414
reference_id
reference_type
scores
url http://secunia.com/advisories/18414
29
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
30
reference_url http://secunia.com/advisories/18423
reference_id
reference_type
scores
url http://secunia.com/advisories/18423
31
reference_url http://secunia.com/advisories/18425
reference_id
reference_type
scores
url http://secunia.com/advisories/18425
32
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
33
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
34
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
35
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
36
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
37
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
38
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
39
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
40
reference_url http://secunia.com/advisories/18642
reference_id
reference_type
scores
url http://secunia.com/advisories/18642
41
reference_url http://secunia.com/advisories/18644
reference_id
reference_type
scores
url http://secunia.com/advisories/18644
42
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
43
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
44
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
45
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
46
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
47
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
48
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
49
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
50
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24026
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24026
51
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
52
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
53
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
54
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
55
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
56
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
57
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
58
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
59
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
60
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
61
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
62
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
63
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
64
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
65
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
66
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
67
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
68
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
69
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
70
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
71
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
72
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
74
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
75
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
76
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
77
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
78
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
79
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
80
reference_url http://www.redhat.com/support/errata/RHSA-2006-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0163.html
81
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
82
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
83
reference_url http://www.securityfocus.com/bid/16143
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16143
84
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
85
reference_url http://www.vupen.com/english/advisories/2006/0047
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0047
86
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
87
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617828
reference_id 1617828
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617828
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_id cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3626
reference_id CVE-2005-3626
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3626
216
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
217
reference_url https://security.gentoo.org/glsa/200601-17
reference_id GLSA-200601-17
reference_type
scores
url https://security.gentoo.org/glsa/200601-17
218
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
219
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
220
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
221
reference_url https://access.redhat.com/errata/RHSA-2006:0163
reference_id RHSA-2006:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0163
222
reference_url https://access.redhat.com/errata/RHSA-2006:0177
reference_id RHSA-2006:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0177
223
reference_url https://usn.ubuntu.com/236-1/
reference_id USN-236-1
reference_type
scores
url https://usn.ubuntu.com/236-1/
224
reference_url https://usn.ubuntu.com/236-2/
reference_id USN-236-2
reference_type
scores
url https://usn.ubuntu.com/236-2/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-3626
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z9b-trb7-2ubp
1
url VCID-4p26-wkq3-v3b2
vulnerability_id VCID-4p26-wkq3-v3b2
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
1
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3628.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3628.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3628
reference_id
reference_type
scores
0
value 0.02683
scoring_system epss
scoring_elements 0.85868
published_at 2026-04-16T12:55:00Z
1
value 0.02683
scoring_system epss
scoring_elements 0.85777
published_at 2026-04-01T12:55:00Z
2
value 0.02683
scoring_system epss
scoring_elements 0.85789
published_at 2026-04-02T12:55:00Z
3
value 0.02683
scoring_system epss
scoring_elements 0.85808
published_at 2026-04-04T12:55:00Z
4
value 0.02683
scoring_system epss
scoring_elements 0.85813
published_at 2026-04-07T12:55:00Z
5
value 0.02683
scoring_system epss
scoring_elements 0.85832
published_at 2026-04-08T12:55:00Z
6
value 0.02683
scoring_system epss
scoring_elements 0.85842
published_at 2026-04-09T12:55:00Z
7
value 0.02683
scoring_system epss
scoring_elements 0.85857
published_at 2026-04-11T12:55:00Z
8
value 0.02683
scoring_system epss
scoring_elements 0.85854
published_at 2026-04-12T12:55:00Z
9
value 0.02683
scoring_system epss
scoring_elements 0.8585
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
5
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
6
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
7
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
8
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
9
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
10
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
11
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
12
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
13
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
14
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
15
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
16
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
17
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
18
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
19
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
20
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
21
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
22
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
23
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
24
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
25
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287
26
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
27
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
28
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
29
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
30
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
31
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
32
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
33
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
34
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
35
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
36
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
37
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
38
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
39
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
40
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617830
reference_id 1617830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617830
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3628
reference_id CVE-2005-3628
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3628
44
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
45
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
46
reference_url https://access.redhat.com/errata/RHSA-2005:867
reference_id RHSA-2005:867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:867
47
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
48
reference_url https://access.redhat.com/errata/RHSA-2005:878
reference_id RHSA-2005:878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:878
49
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-3628
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4p26-wkq3-v3b2
2
url VCID-5q1h-7uk2-nkhx
vulnerability_id VCID-5q1h-7uk2-nkhx
summary
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
    Poppler potentially resulting in the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
2
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
4
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
5
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
6
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2005-868.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-868.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3193
reference_id
reference_type
scores
0
value 0.03031
scoring_system epss
scoring_elements 0.86668
published_at 2026-04-16T12:55:00Z
1
value 0.03031
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-01T12:55:00Z
2
value 0.03031
scoring_system epss
scoring_elements 0.86603
published_at 2026-04-02T12:55:00Z
3
value 0.03031
scoring_system epss
scoring_elements 0.86622
published_at 2026-04-07T12:55:00Z
4
value 0.03031
scoring_system epss
scoring_elements 0.86641
published_at 2026-04-08T12:55:00Z
5
value 0.03031
scoring_system epss
scoring_elements 0.86651
published_at 2026-04-09T12:55:00Z
6
value 0.03031
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-11T12:55:00Z
7
value 0.03031
scoring_system epss
scoring_elements 0.86662
published_at 2026-04-12T12:55:00Z
8
value 0.03031
scoring_system epss
scoring_elements 0.86655
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3193
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
11
reference_url http://secunia.com/advisories/17897
reference_id
reference_type
scores
url http://secunia.com/advisories/17897
12
reference_url http://secunia.com/advisories/17912
reference_id
reference_type
scores
url http://secunia.com/advisories/17912
13
reference_url http://secunia.com/advisories/17916
reference_id
reference_type
scores
url http://secunia.com/advisories/17916
14
reference_url http://secunia.com/advisories/17920
reference_id
reference_type
scores
url http://secunia.com/advisories/17920
15
reference_url http://secunia.com/advisories/17926
reference_id
reference_type
scores
url http://secunia.com/advisories/17926
16
reference_url http://secunia.com/advisories/17929
reference_id
reference_type
scores
url http://secunia.com/advisories/17929
17
reference_url http://secunia.com/advisories/17940
reference_id
reference_type
scores
url http://secunia.com/advisories/17940
18
reference_url http://secunia.com/advisories/17955
reference_id
reference_type
scores
url http://secunia.com/advisories/17955
19
reference_url http://secunia.com/advisories/17956
reference_id
reference_type
scores
url http://secunia.com/advisories/17956
20
reference_url http://secunia.com/advisories/17959
reference_id
reference_type
scores
url http://secunia.com/advisories/17959
21
reference_url http://secunia.com/advisories/17976
reference_id
reference_type
scores
url http://secunia.com/advisories/17976
22
reference_url http://secunia.com/advisories/18009
reference_id
reference_type
scores
url http://secunia.com/advisories/18009
23
reference_url http://secunia.com/advisories/18055
reference_id
reference_type
scores
url http://secunia.com/advisories/18055
24
reference_url http://secunia.com/advisories/18061
reference_id
reference_type
scores
url http://secunia.com/advisories/18061
25
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
26
reference_url http://secunia.com/advisories/18189
reference_id
reference_type
scores
url http://secunia.com/advisories/18189
27
reference_url http://secunia.com/advisories/18191
reference_id
reference_type
scores
url http://secunia.com/advisories/18191
28
reference_url http://secunia.com/advisories/18192
reference_id
reference_type
scores
url http://secunia.com/advisories/18192
29
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
30
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
31
reference_url http://secunia.com/advisories/18336
reference_id
reference_type
scores
url http://secunia.com/advisories/18336
32
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
33
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
34
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
35
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
36
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
37
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
38
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
39
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
40
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
41
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
42
reference_url http://secunia.com/advisories/18520
reference_id
reference_type
scores
url http://secunia.com/advisories/18520
43
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
44
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
45
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
46
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
47
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
48
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
49
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
50
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
51
reference_url http://secunia.com/advisories/19125
reference_id
reference_type
scores
url http://secunia.com/advisories/19125
52
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
53
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
54
reference_url http://secunia.com/advisories/19797
reference_id
reference_type
scores
url http://secunia.com/advisories/19797
55
reference_url http://secunia.com/advisories/19798
reference_id
reference_type
scores
url http://secunia.com/advisories/19798
56
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
57
reference_url http://secunia.com/advisories/26413
reference_id
reference_type
scores
url http://secunia.com/advisories/26413
58
reference_url http://securityreason.com/securityalert/236
reference_id
reference_type
scores
url http://securityreason.com/securityalert/236
59
reference_url http://securitytracker.com/id?1015309
reference_id
reference_type
scores
url http://securitytracker.com/id?1015309
60
reference_url http://securitytracker.com/id?1015324
reference_id
reference_type
scores
url http://securitytracker.com/id?1015324
61
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23441
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23441
62
reference_url https://issues.rpath.com/browse/RPL-1609
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1609
63
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
64
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
65
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440
66
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
67
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
68
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
69
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
70
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
71
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
72
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
73
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
74
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
75
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
76
reference_url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
77
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
78
reference_url http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml
79
reference_url http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true
80
reference_url http://www.kde.org/info/security/advisory-20051207-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-1.txt
81
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
82
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
83
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
84
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
85
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
86
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
87
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
88
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
89
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
90
reference_url http://www.novell.com/linux/security/advisories/2005_29_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_29_sr.html
91
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html
92
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
93
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
94
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html
95
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
96
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
97
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html
98
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html
99
reference_url http://www.redhat.com/support/errata/RHSA-2005-840.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-840.html
100
reference_url http://www.redhat.com/support/errata/RHSA-2005-867.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-867.html
101
reference_url http://www.redhat.com/support/errata/RHSA-2005-878.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-878.html
102
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
103
reference_url http://www.securityfocus.com/archive/1/418883/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/418883/100/0/threaded
104
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
105
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
106
reference_url http://www.securityfocus.com/bid/15721
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15721
107
reference_url http://www.trustix.org/errata/2005/0072/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0072/
108
reference_url http://www.ubuntulinux.org/usn/usn-227-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-227-1
109
reference_url http://www.vupen.com/english/advisories/2005/2787
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2787
110
reference_url http://www.vupen.com/english/advisories/2005/2789
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2789
111
reference_url http://www.vupen.com/english/advisories/2005/2790
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2790
112
reference_url http://www.vupen.com/english/advisories/2005/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2856
113
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
114
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617798
reference_id 1617798
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617798
115
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
reference_id 342281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
116
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
reference_id 342288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3193
reference_id CVE-2005-3193
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3193
133
reference_url https://security.gentoo.org/glsa/200512-08
reference_id GLSA-200512-08
reference_type
scores
url https://security.gentoo.org/glsa/200512-08
134
reference_url https://security.gentoo.org/glsa/200603-02
reference_id GLSA-200603-02
reference_type
scores
url https://security.gentoo.org/glsa/200603-02
135
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
136
reference_url https://access.redhat.com/errata/RHSA-2005:867
reference_id RHSA-2005:867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:867
137
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
138
reference_url https://access.redhat.com/errata/RHSA-2005:878
reference_id RHSA-2005:878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:878
139
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
140
reference_url https://usn.ubuntu.com/227-1/
reference_id USN-227-1
reference_type
scores
url https://usn.ubuntu.com/227-1/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-3193
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q1h-7uk2-nkhx
3
url VCID-8uds-zs9k-47en
vulnerability_id VCID-8uds-zs9k-47en
summary
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
    Poppler potentially resulting in the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
2
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
4
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
5
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
6
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
7
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2005-868.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-868.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3191
reference_id
reference_type
scores
0
value 0.03031
scoring_system epss
scoring_elements 0.86668
published_at 2026-04-16T12:55:00Z
1
value 0.03031
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-01T12:55:00Z
2
value 0.03031
scoring_system epss
scoring_elements 0.86603
published_at 2026-04-02T12:55:00Z
3
value 0.03031
scoring_system epss
scoring_elements 0.86622
published_at 2026-04-07T12:55:00Z
4
value 0.03031
scoring_system epss
scoring_elements 0.86641
published_at 2026-04-08T12:55:00Z
5
value 0.03031
scoring_system epss
scoring_elements 0.86651
published_at 2026-04-09T12:55:00Z
6
value 0.03031
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-11T12:55:00Z
7
value 0.03031
scoring_system epss
scoring_elements 0.86662
published_at 2026-04-12T12:55:00Z
8
value 0.03031
scoring_system epss
scoring_elements 0.86655
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3191
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
12
reference_url http://secunia.com/advisories/17897
reference_id
reference_type
scores
url http://secunia.com/advisories/17897
13
reference_url http://secunia.com/advisories/17908
reference_id
reference_type
scores
url http://secunia.com/advisories/17908
14
reference_url http://secunia.com/advisories/17912
reference_id
reference_type
scores
url http://secunia.com/advisories/17912
15
reference_url http://secunia.com/advisories/17916
reference_id
reference_type
scores
url http://secunia.com/advisories/17916
16
reference_url http://secunia.com/advisories/17920
reference_id
reference_type
scores
url http://secunia.com/advisories/17920
17
reference_url http://secunia.com/advisories/17921
reference_id
reference_type
scores
url http://secunia.com/advisories/17921
18
reference_url http://secunia.com/advisories/17926
reference_id
reference_type
scores
url http://secunia.com/advisories/17926
19
reference_url http://secunia.com/advisories/17929
reference_id
reference_type
scores
url http://secunia.com/advisories/17929
20
reference_url http://secunia.com/advisories/17940
reference_id
reference_type
scores
url http://secunia.com/advisories/17940
21
reference_url http://secunia.com/advisories/17955
reference_id
reference_type
scores
url http://secunia.com/advisories/17955
22
reference_url http://secunia.com/advisories/17976
reference_id
reference_type
scores
url http://secunia.com/advisories/17976
23
reference_url http://secunia.com/advisories/18009
reference_id
reference_type
scores
url http://secunia.com/advisories/18009
24
reference_url http://secunia.com/advisories/18055
reference_id
reference_type
scores
url http://secunia.com/advisories/18055
25
reference_url http://secunia.com/advisories/18061
reference_id
reference_type
scores
url http://secunia.com/advisories/18061
26
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
27
reference_url http://secunia.com/advisories/18189
reference_id
reference_type
scores
url http://secunia.com/advisories/18189
28
reference_url http://secunia.com/advisories/18191
reference_id
reference_type
scores
url http://secunia.com/advisories/18191
29
reference_url http://secunia.com/advisories/18192
reference_id
reference_type
scores
url http://secunia.com/advisories/18192
30
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
31
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
32
reference_url http://secunia.com/advisories/18336
reference_id
reference_type
scores
url http://secunia.com/advisories/18336
33
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
34
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
35
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
36
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
37
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
38
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
39
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
40
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
41
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
42
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
43
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
44
reference_url http://secunia.com/advisories/18503
reference_id
reference_type
scores
url http://secunia.com/advisories/18503
45
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
46
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
47
reference_url http://secunia.com/advisories/18549
reference_id
reference_type
scores
url http://secunia.com/advisories/18549
48
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
49
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
50
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
51
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
52
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
53
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
54
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
55
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
56
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
57
reference_url http://secunia.com/advisories/19797
reference_id
reference_type
scores
url http://secunia.com/advisories/19797
58
reference_url http://secunia.com/advisories/19798
reference_id
reference_type
scores
url http://secunia.com/advisories/19798
59
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
60
reference_url http://secunia.com/advisories/26413
reference_id
reference_type
scores
url http://secunia.com/advisories/26413
61
reference_url http://securityreason.com/securityalert/233
reference_id
reference_type
scores
url http://securityreason.com/securityalert/233
62
reference_url http://securityreason.com/securityalert/234
reference_id
reference_type
scores
url http://securityreason.com/securityalert/234
63
reference_url http://securitytracker.com/id?1015309
reference_id
reference_type
scores
url http://securitytracker.com/id?1015309
64
reference_url http://securitytracker.com/id?1015324
reference_id
reference_type
scores
url http://securitytracker.com/id?1015324
65
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23443
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23443
66
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23444
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23444
67
reference_url https://issues.rpath.com/browse/RPL-1609
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1609
68
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
69
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
70
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
71
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
72
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
73
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
74
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
75
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
76
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
77
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
78
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
79
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
80
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
81
reference_url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
82
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
83
reference_url http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities
84
reference_url http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities
85
reference_url http://www.kde.org/info/security/advisory-20051207-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-1.txt
86
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
87
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
88
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
89
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
90
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
91
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
92
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
93
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
94
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
95
reference_url http://www.novell.com/linux/security/advisories/2005_29_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_29_sr.html
96
reference_url http://www.novell.com/linux/security/advisories/2006_02_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_02_sr.html
97
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
98
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
99
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
100
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
101
reference_url http://www.redhat.com/support/errata/RHSA-2005-840.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-840.html
102
reference_url http://www.redhat.com/support/errata/RHSA-2005-867.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-867.html
103
reference_url http://www.redhat.com/support/errata/RHSA-2005-878.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-878.html
104
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
105
reference_url http://www.securityfocus.com/archive/1/418883/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/418883/100/0/threaded
106
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
107
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
108
reference_url http://www.securityfocus.com/bid/15726
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15726
109
reference_url http://www.securityfocus.com/bid/15727
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15727
110
reference_url http://www.trustix.org/errata/2005/0072/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0072/
111
reference_url http://www.ubuntulinux.org/usn/usn-227-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-227-1
112
reference_url http://www.vupen.com/english/advisories/2005/2786
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2786
113
reference_url http://www.vupen.com/english/advisories/2005/2787
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2787
114
reference_url http://www.vupen.com/english/advisories/2005/2788
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2788
115
reference_url http://www.vupen.com/english/advisories/2005/2789
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2789
116
reference_url http://www.vupen.com/english/advisories/2005/2790
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2790
117
reference_url http://www.vupen.com/english/advisories/2005/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2856
118
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
119
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617796
reference_id 1617796
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617796
120
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
reference_id 342281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
121
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
reference_id 342288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3191
reference_id CVE-2005-3191
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3191
138
reference_url https://security.gentoo.org/glsa/200512-08
reference_id GLSA-200512-08
reference_type
scores
url https://security.gentoo.org/glsa/200512-08
139
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
140
reference_url https://access.redhat.com/errata/RHSA-2005:867
reference_id RHSA-2005:867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:867
141
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
142
reference_url https://access.redhat.com/errata/RHSA-2005:878
reference_id RHSA-2005:878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:878
143
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
144
reference_url https://usn.ubuntu.com/227-1/
reference_id USN-227-1
reference_type
scores
url https://usn.ubuntu.com/227-1/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-3191
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uds-zs9k-47en
4
url VCID-bkr4-sab1-5ka2
vulnerability_id VCID-bkr4-sab1-5ka2
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
4
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0177.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0177.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3627
reference_id
reference_type
scores
0
value 0.04327
scoring_system epss
scoring_elements 0.88931
published_at 2026-04-16T12:55:00Z
1
value 0.04327
scoring_system epss
scoring_elements 0.88863
published_at 2026-04-01T12:55:00Z
2
value 0.04327
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-02T12:55:00Z
3
value 0.04327
scoring_system epss
scoring_elements 0.88887
published_at 2026-04-04T12:55:00Z
4
value 0.04327
scoring_system epss
scoring_elements 0.88888
published_at 2026-04-07T12:55:00Z
5
value 0.04327
scoring_system epss
scoring_elements 0.88906
published_at 2026-04-08T12:55:00Z
6
value 0.04327
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-09T12:55:00Z
7
value 0.04327
scoring_system epss
scoring_elements 0.88923
published_at 2026-04-11T12:55:00Z
8
value 0.04327
scoring_system epss
scoring_elements 0.88918
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3627
8
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
10
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
11
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
12
reference_url http://secunia.com/advisories/18312
reference_id
reference_type
scores
url http://secunia.com/advisories/18312
13
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
14
reference_url http://secunia.com/advisories/18329
reference_id
reference_type
scores
url http://secunia.com/advisories/18329
15
reference_url http://secunia.com/advisories/18332
reference_id
reference_type
scores
url http://secunia.com/advisories/18332
16
reference_url http://secunia.com/advisories/18334
reference_id
reference_type
scores
url http://secunia.com/advisories/18334
17
reference_url http://secunia.com/advisories/18335
reference_id
reference_type
scores
url http://secunia.com/advisories/18335
18
reference_url http://secunia.com/advisories/18338
reference_id
reference_type
scores
url http://secunia.com/advisories/18338
19
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
20
reference_url http://secunia.com/advisories/18373
reference_id
reference_type
scores
url http://secunia.com/advisories/18373
21
reference_url http://secunia.com/advisories/18375
reference_id
reference_type
scores
url http://secunia.com/advisories/18375
22
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
23
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
24
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
25
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
26
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
27
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
28
reference_url http://secunia.com/advisories/18414
reference_id
reference_type
scores
url http://secunia.com/advisories/18414
29
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
30
reference_url http://secunia.com/advisories/18423
reference_id
reference_type
scores
url http://secunia.com/advisories/18423
31
reference_url http://secunia.com/advisories/18425
reference_id
reference_type
scores
url http://secunia.com/advisories/18425
32
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
33
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
34
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
35
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
36
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
37
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
38
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
39
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
40
reference_url http://secunia.com/advisories/18642
reference_id
reference_type
scores
url http://secunia.com/advisories/18642
41
reference_url http://secunia.com/advisories/18644
reference_id
reference_type
scores
url http://secunia.com/advisories/18644
42
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
43
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
44
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
45
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
46
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
47
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
48
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
49
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
50
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24024
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24024
51
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24025
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24025
52
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
53
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
54
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200
55
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
56
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
57
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
58
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
59
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
60
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
61
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
62
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
63
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
64
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
65
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
66
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
67
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
68
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
69
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
70
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
71
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
72
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
74
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
75
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
76
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
77
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
78
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
79
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
80
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
81
reference_url http://www.redhat.com/support/errata/RHSA-2006-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0163.html
82
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
83
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
84
reference_url http://www.securityfocus.com/bid/16143
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16143
85
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
86
reference_url http://www.vupen.com/english/advisories/2006/0047
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0047
87
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
88
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617829
reference_id 1617829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617829
89
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
reference_id 346076
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3627
reference_id CVE-2005-3627
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3627
92
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
93
reference_url https://security.gentoo.org/glsa/200601-17
reference_id GLSA-200601-17
reference_type
scores
url https://security.gentoo.org/glsa/200601-17
94
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
95
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
96
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
97
reference_url https://access.redhat.com/errata/RHSA-2006:0163
reference_id RHSA-2006:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0163
98
reference_url https://access.redhat.com/errata/RHSA-2006:0177
reference_id RHSA-2006:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0177
99
reference_url https://usn.ubuntu.com/236-1/
reference_id USN-236-1
reference_type
scores
url https://usn.ubuntu.com/236-1/
100
reference_url https://usn.ubuntu.com/236-2/
reference_id USN-236-2
reference_type
scores
url https://usn.ubuntu.com/236-2/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-3627
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkr4-sab1-5ka2
5
url VCID-durs-kj4r-jbf2
vulnerability_id VCID-durs-kj4r-jbf2
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2097
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21927
published_at 2026-04-16T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21883
published_at 2026-04-01T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-02T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22098
published_at 2026-04-04T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21874
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21956
published_at 2026-04-08T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22011
published_at 2026-04-09T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22026
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097
4
reference_url http://secunia.com/advisories/17277
reference_id
reference_type
scores
url http://secunia.com/advisories/17277
5
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
6
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
7
reference_url http://secunia.com/advisories/21339
reference_id
reference_type
scores
url http://secunia.com/advisories/21339
8
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280
10
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
11
reference_url http://www.debian.org/security/2005/dsa-780
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-780
12
reference_url http://www.debian.org/security/2006/dsa-1136
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1136
13
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
14
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:138
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:138
15
reference_url http://www.novell.com/linux/security/advisories/2005_19_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_19_sr.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2005-670.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-670.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2005-671.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-671.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2005-706.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-706.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2005-708.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-708.html
20
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
21
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/14529
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14529
23
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617684
reference_id 1617684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617684
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462
reference_id 322462
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464
reference_id 324464
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2097
reference_id CVE-2005-2097
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2097
32
reference_url https://access.redhat.com/errata/RHSA-2005:670
reference_id RHSA-2005:670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:670
33
reference_url https://access.redhat.com/errata/RHSA-2005:671
reference_id RHSA-2005:671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:671
34
reference_url https://access.redhat.com/errata/RHSA-2005:706
reference_id RHSA-2005:706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:706
35
reference_url https://access.redhat.com/errata/RHSA-2005:708
reference_id RHSA-2005:708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:708
36
reference_url https://usn.ubuntu.com/163-1/
reference_id USN-163-1
reference_type
scores
url https://usn.ubuntu.com/163-1/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-2097
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-durs-kj4r-jbf2
6
url VCID-fct6-695j-t7bs
vulnerability_id VCID-fct6-695j-t7bs
summary
PDFKit and ImageKits are vulnerable to an integer overflow and a stack
    overflow allowing for the user-assisted execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3387
reference_id
reference_type
scores
0
value 0.08892
scoring_system epss
scoring_elements 0.92529
published_at 2026-04-01T12:55:00Z
1
value 0.08892
scoring_system epss
scoring_elements 0.92534
published_at 2026-04-02T12:55:00Z
2
value 0.08892
scoring_system epss
scoring_elements 0.92541
published_at 2026-04-04T12:55:00Z
3
value 0.08892
scoring_system epss
scoring_elements 0.92544
published_at 2026-04-07T12:55:00Z
4
value 0.08892
scoring_system epss
scoring_elements 0.92554
published_at 2026-04-08T12:55:00Z
5
value 0.08892
scoring_system epss
scoring_elements 0.92559
published_at 2026-04-09T12:55:00Z
6
value 0.08892
scoring_system epss
scoring_elements 0.92565
published_at 2026-04-13T12:55:00Z
7
value 0.08892
scoring_system epss
scoring_elements 0.92566
published_at 2026-04-12T12:55:00Z
8
value 0.08892
scoring_system epss
scoring_elements 0.92577
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3387
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=248194
reference_id 248194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=248194
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460
reference_id 435460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462
reference_id 435462
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462
6
reference_url https://security.gentoo.org/glsa/200709-12
reference_id GLSA-200709-12
reference_type
scores
url https://security.gentoo.org/glsa/200709-12
7
reference_url https://security.gentoo.org/glsa/200709-17
reference_id GLSA-200709-17
reference_type
scores
url https://security.gentoo.org/glsa/200709-17
8
reference_url https://security.gentoo.org/glsa/200710-08
reference_id GLSA-200710-08
reference_type
scores
url https://security.gentoo.org/glsa/200710-08
9
reference_url https://security.gentoo.org/glsa/200710-20
reference_id GLSA-200710-20
reference_type
scores
url https://security.gentoo.org/glsa/200710-20
10
reference_url https://access.redhat.com/errata/RHSA-2007:0720
reference_id RHSA-2007:0720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0720
11
reference_url https://access.redhat.com/errata/RHSA-2007:0729
reference_id RHSA-2007:0729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0729
12
reference_url https://access.redhat.com/errata/RHSA-2007:0730
reference_id RHSA-2007:0730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0730
13
reference_url https://access.redhat.com/errata/RHSA-2007:0731
reference_id RHSA-2007:0731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0731
14
reference_url https://access.redhat.com/errata/RHSA-2007:0732
reference_id RHSA-2007:0732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0732
15
reference_url https://access.redhat.com/errata/RHSA-2007:0735
reference_id RHSA-2007:0735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0735
16
reference_url https://usn.ubuntu.com/496-1/
reference_id USN-496-1
reference_type
scores
url https://usn.ubuntu.com/496-1/
17
reference_url https://usn.ubuntu.com/496-2/
reference_id USN-496-2
reference_type
scores
url https://usn.ubuntu.com/496-2/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2007-3387
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fct6-695j-t7bs
7
url VCID-kgk7-hqby-wkez
vulnerability_id VCID-kgk7-hqby-wkez
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4352
reference_id
reference_type
scores
0
value 0.25469
scoring_system epss
scoring_elements 0.9618
published_at 2026-04-01T12:55:00Z
1
value 0.25469
scoring_system epss
scoring_elements 0.96188
published_at 2026-04-02T12:55:00Z
2
value 0.25469
scoring_system epss
scoring_elements 0.96196
published_at 2026-04-04T12:55:00Z
3
value 0.25469
scoring_system epss
scoring_elements 0.96199
published_at 2026-04-07T12:55:00Z
4
value 0.25469
scoring_system epss
scoring_elements 0.96209
published_at 2026-04-08T12:55:00Z
5
value 0.25469
scoring_system epss
scoring_elements 0.96212
published_at 2026-04-09T12:55:00Z
6
value 0.25469
scoring_system epss
scoring_elements 0.96217
published_at 2026-04-11T12:55:00Z
7
value 0.25469
scoring_system epss
scoring_elements 0.96216
published_at 2026-04-12T12:55:00Z
8
value 0.25469
scoring_system epss
scoring_elements 0.96218
published_at 2026-04-13T12:55:00Z
9
value 0.25469
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4352
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345101
reference_id 345101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345101
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
10
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
11
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
12
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
13
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
14
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
15
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
16
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2007-4352
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgk7-hqby-wkez
8
url VCID-mg1z-d7y8-dfaj
vulnerability_id VCID-mg1z-d7y8-dfaj
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
4
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0177.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0177.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3624
reference_id
reference_type
scores
0
value 0.07357
scoring_system epss
scoring_elements 0.91732
published_at 2026-04-16T12:55:00Z
1
value 0.07357
scoring_system epss
scoring_elements 0.91668
published_at 2026-04-01T12:55:00Z
2
value 0.07357
scoring_system epss
scoring_elements 0.91676
published_at 2026-04-02T12:55:00Z
3
value 0.07357
scoring_system epss
scoring_elements 0.91682
published_at 2026-04-04T12:55:00Z
4
value 0.07357
scoring_system epss
scoring_elements 0.91691
published_at 2026-04-07T12:55:00Z
5
value 0.07357
scoring_system epss
scoring_elements 0.91703
published_at 2026-04-08T12:55:00Z
6
value 0.07357
scoring_system epss
scoring_elements 0.9171
published_at 2026-04-09T12:55:00Z
7
value 0.07357
scoring_system epss
scoring_elements 0.91713
published_at 2026-04-11T12:55:00Z
8
value 0.07357
scoring_system epss
scoring_elements 0.91716
published_at 2026-04-12T12:55:00Z
9
value 0.07357
scoring_system epss
scoring_elements 0.91712
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3624
8
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
10
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
11
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
12
reference_url http://secunia.com/advisories/18312
reference_id
reference_type
scores
url http://secunia.com/advisories/18312
13
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
14
reference_url http://secunia.com/advisories/18329
reference_id
reference_type
scores
url http://secunia.com/advisories/18329
15
reference_url http://secunia.com/advisories/18332
reference_id
reference_type
scores
url http://secunia.com/advisories/18332
16
reference_url http://secunia.com/advisories/18334
reference_id
reference_type
scores
url http://secunia.com/advisories/18334
17
reference_url http://secunia.com/advisories/18338
reference_id
reference_type
scores
url http://secunia.com/advisories/18338
18
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
19
reference_url http://secunia.com/advisories/18373
reference_id
reference_type
scores
url http://secunia.com/advisories/18373
20
reference_url http://secunia.com/advisories/18375
reference_id
reference_type
scores
url http://secunia.com/advisories/18375
21
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
22
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
23
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
24
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
25
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
26
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
27
reference_url http://secunia.com/advisories/18414
reference_id
reference_type
scores
url http://secunia.com/advisories/18414
28
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
29
reference_url http://secunia.com/advisories/18423
reference_id
reference_type
scores
url http://secunia.com/advisories/18423
30
reference_url http://secunia.com/advisories/18425
reference_id
reference_type
scores
url http://secunia.com/advisories/18425
31
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
32
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
33
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
34
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
35
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
36
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
37
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
38
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
39
reference_url http://secunia.com/advisories/18642
reference_id
reference_type
scores
url http://secunia.com/advisories/18642
40
reference_url http://secunia.com/advisories/18644
reference_id
reference_type
scores
url http://secunia.com/advisories/18644
41
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
42
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
43
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
44
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
45
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
46
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
47
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
48
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
49
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24022
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24022
50
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
51
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
52
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
53
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
54
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
55
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
56
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
57
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
58
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
59
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
60
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
61
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
62
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
63
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
64
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
65
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
66
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
67
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
68
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
69
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
70
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
71
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
72
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
74
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
75
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
76
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
77
reference_url http://www.redhat.com/support/errata/RHSA-2006-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0163.html
78
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
79
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
80
reference_url http://www.securityfocus.com/bid/16143
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16143
81
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
82
reference_url http://www.vupen.com/english/advisories/2006/0047
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0047
83
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
84
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617826
reference_id 1617826
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617826
85
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
reference_id 346076
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_id cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3624
reference_id CVE-2005-3624
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-3624
214
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
215
reference_url https://security.gentoo.org/glsa/200601-17
reference_id GLSA-200601-17
reference_type
scores
url https://security.gentoo.org/glsa/200601-17
216
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
217
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
218
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
219
reference_url https://access.redhat.com/errata/RHSA-2006:0163
reference_id RHSA-2006:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0163
220
reference_url https://access.redhat.com/errata/RHSA-2006:0177
reference_id RHSA-2006:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0177
221
reference_url https://usn.ubuntu.com/236-1/
reference_id USN-236-1
reference_type
scores
url https://usn.ubuntu.com/236-1/
222
reference_url https://usn.ubuntu.com/236-2/
reference_id USN-236-2
reference_type
scores
url https://usn.ubuntu.com/236-2/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-3624
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mg1z-d7y8-dfaj
9
url VCID-qayv-8u9a-83h4
vulnerability_id VCID-qayv-8u9a-83h4
summary
KPdf includes vulnerable Xpdf code to handle PDF files, making it
    vulnerable to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0301
reference_id
reference_type
scores
0
value 0.03084
scoring_system epss
scoring_elements 0.86717
published_at 2026-04-01T12:55:00Z
1
value 0.03084
scoring_system epss
scoring_elements 0.86727
published_at 2026-04-02T12:55:00Z
2
value 0.03084
scoring_system epss
scoring_elements 0.86746
published_at 2026-04-04T12:55:00Z
3
value 0.03084
scoring_system epss
scoring_elements 0.86745
published_at 2026-04-07T12:55:00Z
4
value 0.03084
scoring_system epss
scoring_elements 0.86764
published_at 2026-04-08T12:55:00Z
5
value 0.03084
scoring_system epss
scoring_elements 0.86773
published_at 2026-04-09T12:55:00Z
6
value 0.03084
scoring_system epss
scoring_elements 0.86786
published_at 2026-04-11T12:55:00Z
7
value 0.03084
scoring_system epss
scoring_elements 0.86783
published_at 2026-04-12T12:55:00Z
8
value 0.03084
scoring_system epss
scoring_elements 0.86778
published_at 2026-04-13T12:55:00Z
9
value 0.03084
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0301
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617882
reference_id 1617882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617882
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783
reference_id 350783
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783
5
reference_url https://security.gentoo.org/glsa/200602-04
reference_id GLSA-200602-04
reference_type
scores
url https://security.gentoo.org/glsa/200602-04
6
reference_url https://security.gentoo.org/glsa/200602-05
reference_id GLSA-200602-05
reference_type
scores
url https://security.gentoo.org/glsa/200602-05
7
reference_url https://security.gentoo.org/glsa/200602-12
reference_id GLSA-200602-12
reference_type
scores
url https://security.gentoo.org/glsa/200602-12
8
reference_url https://access.redhat.com/errata/RHSA-2006:0201
reference_id RHSA-2006:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0201
9
reference_url https://access.redhat.com/errata/RHSA-2006:0206
reference_id RHSA-2006:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0206
10
reference_url https://usn.ubuntu.com/249-1/
reference_id USN-249-1
reference_type
scores
url https://usn.ubuntu.com/249-1/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2006-0301
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qayv-8u9a-83h4
10
url VCID-sv3r-4tym-qua5
vulnerability_id VCID-sv3r-4tym-qua5
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5393
reference_id
reference_type
scores
0
value 0.14245
scoring_system epss
scoring_elements 0.94355
published_at 2026-04-01T12:55:00Z
1
value 0.14245
scoring_system epss
scoring_elements 0.94364
published_at 2026-04-02T12:55:00Z
2
value 0.14245
scoring_system epss
scoring_elements 0.94374
published_at 2026-04-04T12:55:00Z
3
value 0.14245
scoring_system epss
scoring_elements 0.94375
published_at 2026-04-07T12:55:00Z
4
value 0.14245
scoring_system epss
scoring_elements 0.94385
published_at 2026-04-08T12:55:00Z
5
value 0.14245
scoring_system epss
scoring_elements 0.94389
published_at 2026-04-09T12:55:00Z
6
value 0.14245
scoring_system epss
scoring_elements 0.94392
published_at 2026-04-11T12:55:00Z
7
value 0.14245
scoring_system epss
scoring_elements 0.94393
published_at 2026-04-12T12:55:00Z
8
value 0.14245
scoring_system epss
scoring_elements 0.94394
published_at 2026-04-13T12:55:00Z
9
value 0.14245
scoring_system epss
scoring_elements 0.94408
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345121
reference_id 345121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345121
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1023
reference_id RHSA-2007:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1023
10
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
11
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
12
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
13
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
14
reference_url https://access.redhat.com/errata/RHSA-2007:1028
reference_id RHSA-2007:1028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1028
15
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
16
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
17
reference_url https://access.redhat.com/errata/RHSA-2007:1031
reference_id RHSA-2007:1031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1031
18
reference_url https://access.redhat.com/errata/RHSA-2007:1051
reference_id RHSA-2007:1051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1051
19
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
20
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2007-5393
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sv3r-4tym-qua5
11
url VCID-utex-65f9-53cq
vulnerability_id VCID-utex-65f9-53cq
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
4
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0177.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0177.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3625
reference_id
reference_type
scores
0
value 0.11286
scoring_system epss
scoring_elements 0.93542
published_at 2026-04-16T12:55:00Z
1
value 0.11286
scoring_system epss
scoring_elements 0.9349
published_at 2026-04-01T12:55:00Z
2
value 0.11286
scoring_system epss
scoring_elements 0.93499
published_at 2026-04-02T12:55:00Z
3
value 0.11286
scoring_system epss
scoring_elements 0.93507
published_at 2026-04-04T12:55:00Z
4
value 0.11286
scoring_system epss
scoring_elements 0.93506
published_at 2026-04-07T12:55:00Z
5
value 0.11286
scoring_system epss
scoring_elements 0.93515
published_at 2026-04-08T12:55:00Z
6
value 0.11286
scoring_system epss
scoring_elements 0.93518
published_at 2026-04-09T12:55:00Z
7
value 0.11286
scoring_system epss
scoring_elements 0.93523
published_at 2026-04-13T12:55:00Z
8
value 0.11286
scoring_system epss
scoring_elements 0.93522
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3625
8
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
10
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
11
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
12
reference_url http://secunia.com/advisories/18312
reference_id
reference_type
scores
url http://secunia.com/advisories/18312
13
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
14
reference_url http://secunia.com/advisories/18329
reference_id
reference_type
scores
url http://secunia.com/advisories/18329
15
reference_url http://secunia.com/advisories/18332
reference_id
reference_type
scores
url http://secunia.com/advisories/18332
16
reference_url http://secunia.com/advisories/18334
reference_id
reference_type
scores
url http://secunia.com/advisories/18334
17
reference_url http://secunia.com/advisories/18335
reference_id
reference_type
scores
url http://secunia.com/advisories/18335
18
reference_url http://secunia.com/advisories/18338
reference_id
reference_type
scores
url http://secunia.com/advisories/18338
19
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
20
reference_url http://secunia.com/advisories/18373
reference_id
reference_type
scores
url http://secunia.com/advisories/18373
21
reference_url http://secunia.com/advisories/18375
reference_id
reference_type
scores
url http://secunia.com/advisories/18375
22
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
23
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
24
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
25
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
26
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
27
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
28
reference_url http://secunia.com/advisories/18414
reference_id
reference_type
scores
url http://secunia.com/advisories/18414
29
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
30
reference_url http://secunia.com/advisories/18423
reference_id
reference_type
scores
url http://secunia.com/advisories/18423
31
reference_url http://secunia.com/advisories/18425
reference_id
reference_type
scores
url http://secunia.com/advisories/18425
32
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
33
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
34
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
35
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
36
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
37
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
38
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
39
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
40
reference_url http://secunia.com/advisories/18642
reference_id
reference_type
scores
url http://secunia.com/advisories/18642
41
reference_url http://secunia.com/advisories/18644
reference_id
reference_type
scores
url http://secunia.com/advisories/18644
42
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
43
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
44
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
45
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
46
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
47
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
48
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
49
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
50
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
51
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
52
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
53
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
54
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
55
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
56
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
57
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
58
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
59
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
60
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
61
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
62
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
63
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
64
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
65
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
66
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
67
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
68
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
69
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
70
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
71
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
72
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
74
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
75
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
76
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
77
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
78
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
79
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
80
reference_url http://www.redhat.com/support/errata/RHSA-2006-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0163.html
81
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
82
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
83
reference_url http://www.securityfocus.com/bid/16143
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16143
84
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
85
reference_url http://www.vupen.com/english/advisories/2006/0047
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0047
86
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
87
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617827
reference_id 1617827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617827
88
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
reference_id 346076
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_id cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3625
reference_id CVE-2005-3625
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2005-3625
217
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
218
reference_url https://security.gentoo.org/glsa/200601-17
reference_id GLSA-200601-17
reference_type
scores
url https://security.gentoo.org/glsa/200601-17
219
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
220
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
221
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
222
reference_url https://access.redhat.com/errata/RHSA-2006:0163
reference_id RHSA-2006:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0163
223
reference_url https://access.redhat.com/errata/RHSA-2006:0177
reference_id RHSA-2006:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0177
224
reference_url https://usn.ubuntu.com/236-1/
reference_id USN-236-1
reference_type
scores
url https://usn.ubuntu.com/236-1/
225
reference_url https://usn.ubuntu.com/236-2/
reference_id USN-236-2
reference_type
scores
url https://usn.ubuntu.com/236-2/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-3625
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-utex-65f9-53cq
12
url VCID-wpgs-8fw5-wbhe
vulnerability_id VCID-wpgs-8fw5-wbhe
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5392
reference_id
reference_type
scores
0
value 0.06567
scoring_system epss
scoring_elements 0.91095
published_at 2026-04-01T12:55:00Z
1
value 0.06567
scoring_system epss
scoring_elements 0.911
published_at 2026-04-02T12:55:00Z
2
value 0.06567
scoring_system epss
scoring_elements 0.91109
published_at 2026-04-04T12:55:00Z
3
value 0.06567
scoring_system epss
scoring_elements 0.91117
published_at 2026-04-07T12:55:00Z
4
value 0.06567
scoring_system epss
scoring_elements 0.91129
published_at 2026-04-08T12:55:00Z
5
value 0.06567
scoring_system epss
scoring_elements 0.91135
published_at 2026-04-09T12:55:00Z
6
value 0.06567
scoring_system epss
scoring_elements 0.91143
published_at 2026-04-11T12:55:00Z
7
value 0.06567
scoring_system epss
scoring_elements 0.91144
published_at 2026-04-13T12:55:00Z
8
value 0.06567
scoring_system epss
scoring_elements 0.91168
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345111
reference_id 345111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345111
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
10
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
11
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
12
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
13
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
14
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
15
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
16
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2007-5392
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpgs-8fw5-wbhe
13
url VCID-xqh5-sxfb-gueh
vulnerability_id VCID-xqh5-sxfb-gueh
summary
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
    Poppler potentially resulting in the execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
2
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
3
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
4
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
5
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
6
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
7
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
8
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2005-868.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-868.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3192
reference_id
reference_type
scores
0
value 0.12279
scoring_system epss
scoring_elements 0.9388
published_at 2026-04-16T12:55:00Z
1
value 0.12279
scoring_system epss
scoring_elements 0.9382
published_at 2026-04-01T12:55:00Z
2
value 0.12279
scoring_system epss
scoring_elements 0.93829
published_at 2026-04-02T12:55:00Z
3
value 0.12279
scoring_system epss
scoring_elements 0.93838
published_at 2026-04-04T12:55:00Z
4
value 0.12279
scoring_system epss
scoring_elements 0.93841
published_at 2026-04-07T12:55:00Z
5
value 0.12279
scoring_system epss
scoring_elements 0.93849
published_at 2026-04-08T12:55:00Z
6
value 0.12279
scoring_system epss
scoring_elements 0.93853
published_at 2026-04-09T12:55:00Z
7
value 0.12279
scoring_system epss
scoring_elements 0.93858
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3192
12
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
14
reference_url http://secunia.com/advisories/17897/
reference_id
reference_type
scores
url http://secunia.com/advisories/17897/
15
reference_url http://secunia.com/advisories/17908
reference_id
reference_type
scores
url http://secunia.com/advisories/17908
16
reference_url http://secunia.com/advisories/17912
reference_id
reference_type
scores
url http://secunia.com/advisories/17912
17
reference_url http://secunia.com/advisories/17916
reference_id
reference_type
scores
url http://secunia.com/advisories/17916
18
reference_url http://secunia.com/advisories/17920
reference_id
reference_type
scores
url http://secunia.com/advisories/17920
19
reference_url http://secunia.com/advisories/17921
reference_id
reference_type
scores
url http://secunia.com/advisories/17921
20
reference_url http://secunia.com/advisories/17926
reference_id
reference_type
scores
url http://secunia.com/advisories/17926
21
reference_url http://secunia.com/advisories/17929
reference_id
reference_type
scores
url http://secunia.com/advisories/17929
22
reference_url http://secunia.com/advisories/17940
reference_id
reference_type
scores
url http://secunia.com/advisories/17940
23
reference_url http://secunia.com/advisories/17955
reference_id
reference_type
scores
url http://secunia.com/advisories/17955
24
reference_url http://secunia.com/advisories/17976
reference_id
reference_type
scores
url http://secunia.com/advisories/17976
25
reference_url http://secunia.com/advisories/18009
reference_id
reference_type
scores
url http://secunia.com/advisories/18009
26
reference_url http://secunia.com/advisories/18055
reference_id
reference_type
scores
url http://secunia.com/advisories/18055
27
reference_url http://secunia.com/advisories/18061
reference_id
reference_type
scores
url http://secunia.com/advisories/18061
28
reference_url http://secunia.com/advisories/18189
reference_id
reference_type
scores
url http://secunia.com/advisories/18189
29
reference_url http://secunia.com/advisories/18191
reference_id
reference_type
scores
url http://secunia.com/advisories/18191
30
reference_url http://secunia.com/advisories/18192
reference_id
reference_type
scores
url http://secunia.com/advisories/18192
31
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
32
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
33
reference_url http://secunia.com/advisories/18336
reference_id
reference_type
scores
url http://secunia.com/advisories/18336
34
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
35
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
36
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
37
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
38
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
39
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
40
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
41
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
42
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
43
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
44
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
45
reference_url http://secunia.com/advisories/18503
reference_id
reference_type
scores
url http://secunia.com/advisories/18503
46
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
47
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
48
reference_url http://secunia.com/advisories/18549
reference_id
reference_type
scores
url http://secunia.com/advisories/18549
49
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
50
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
51
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
52
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
53
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
54
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
55
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
56
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
57
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
58
reference_url http://secunia.com/advisories/19797
reference_id
reference_type
scores
url http://secunia.com/advisories/19797
59
reference_url http://secunia.com/advisories/19798
reference_id
reference_type
scores
url http://secunia.com/advisories/19798
60
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
61
reference_url http://secunia.com/advisories/26413
reference_id
reference_type
scores
url http://secunia.com/advisories/26413
62
reference_url http://securityreason.com/securityalert/235
reference_id
reference_type
scores
url http://securityreason.com/securityalert/235
63
reference_url http://securityreason.com/securityalert/240
reference_id
reference_type
scores
url http://securityreason.com/securityalert/240
64
reference_url http://securitytracker.com/id?1015309
reference_id
reference_type
scores
url http://securitytracker.com/id?1015309
65
reference_url http://securitytracker.com/id?1015324
reference_id
reference_type
scores
url http://securitytracker.com/id?1015324
66
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23442
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23442
67
reference_url https://issues.rpath.com/browse/RPL-1609
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1609
68
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
69
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
70
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914
71
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
72
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
73
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
74
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
75
reference_url http://www.debian.org/security/2006/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-937
76
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
77
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
78
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
79
reference_url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
80
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
81
reference_url http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities
82
reference_url http://www.kde.org/info/security/advisory-20051207-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-1.txt
83
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
84
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
85
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
86
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
87
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
88
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
89
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
90
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
91
reference_url http://www.novell.com/linux/security/advisories/2005_29_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_29_sr.html
92
reference_url http://www.novell.com/linux/security/advisories/2006_02_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_02_sr.html
93
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
94
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
95
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
96
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
97
reference_url http://www.redhat.com/support/errata/RHSA-2005-840.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-840.html
98
reference_url http://www.redhat.com/support/errata/RHSA-2005-867.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-867.html
99
reference_url http://www.redhat.com/support/errata/RHSA-2005-878.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-878.html
100
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
101
reference_url http://www.securityfocus.com/archive/1/418883/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/418883/100/0/threaded
102
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
103
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
104
reference_url http://www.securityfocus.com/bid/15725
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15725
105
reference_url http://www.trustix.org/errata/2005/0072/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0072/
106
reference_url http://www.ubuntulinux.org/usn/usn-227-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-227-1
107
reference_url http://www.vupen.com/english/advisories/2005/2755
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2755
108
reference_url http://www.vupen.com/english/advisories/2005/2786
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2786
109
reference_url http://www.vupen.com/english/advisories/2005/2787
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2787
110
reference_url http://www.vupen.com/english/advisories/2005/2788
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2788
111
reference_url http://www.vupen.com/english/advisories/2005/2789
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2789
112
reference_url http://www.vupen.com/english/advisories/2005/2790
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2790
113
reference_url http://www.vupen.com/english/advisories/2005/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2856
114
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
115
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617797
reference_id 1617797
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617797
116
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
reference_id 342281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
117
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
reference_id 342288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3192
reference_id CVE-2005-3192
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3192
120
reference_url https://security.gentoo.org/glsa/200512-08
reference_id GLSA-200512-08
reference_type
scores
url https://security.gentoo.org/glsa/200512-08
121
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
122
reference_url https://access.redhat.com/errata/RHSA-2005:867
reference_id RHSA-2005:867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:867
123
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
124
reference_url https://access.redhat.com/errata/RHSA-2005:878
reference_id RHSA-2005:878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:878
125
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
126
reference_url https://usn.ubuntu.com/227-1/
reference_id USN-227-1
reference_type
scores
url https://usn.ubuntu.com/227-1/
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2005-3192
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqh5-sxfb-gueh
14
url VCID-ysee-ywmb-zkep
vulnerability_id VCID-ysee-ywmb-zkep
summary Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c).
references
0
reference_url http://gnunet.org/libextractor
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://gnunet.org/libextractor
1
reference_url http://gnunet.org/libextractor/
reference_id
reference_type
scores
url http://gnunet.org/libextractor/
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2458
reference_id
reference_type
scores
0
value 0.19115
scoring_system epss
scoring_elements 0.95354
published_at 2026-04-16T12:55:00Z
1
value 0.19115
scoring_system epss
scoring_elements 0.95318
published_at 2026-04-02T12:55:00Z
2
value 0.19115
scoring_system epss
scoring_elements 0.95324
published_at 2026-04-04T12:55:00Z
3
value 0.19115
scoring_system epss
scoring_elements 0.95329
published_at 2026-04-07T12:55:00Z
4
value 0.19115
scoring_system epss
scoring_elements 0.95335
published_at 2026-04-08T12:55:00Z
5
value 0.19115
scoring_system epss
scoring_elements 0.95339
published_at 2026-04-09T12:55:00Z
6
value 0.19115
scoring_system epss
scoring_elements 0.95344
published_at 2026-04-12T12:55:00Z
7
value 0.19115
scoring_system epss
scoring_elements 0.95346
published_at 2026-04-13T12:55:00Z
8
value 0.19115
scoring_system epss
scoring_elements 0.95307
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2458
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458
4
reference_url http://secunia.com/advisories/20150
reference_id
reference_type
scores
url http://secunia.com/advisories/20150
5
reference_url http://secunia.com/advisories/20160
reference_id
reference_type
scores
url http://secunia.com/advisories/20160
6
reference_url http://secunia.com/advisories/20326
reference_id
reference_type
scores
url http://secunia.com/advisories/20326
7
reference_url http://secunia.com/advisories/20457
reference_id
reference_type
scores
url http://secunia.com/advisories/20457
8
reference_url http://securityreason.com/securityalert/916
reference_id
reference_type
scores
url http://securityreason.com/securityalert/916
9
reference_url http://securitytracker.com/id?1016118
reference_id
reference_type
scores
url http://securitytracker.com/id?1016118
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/26531
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/26531
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/26532
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/26532
12
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/extractor/PYSEC-2006-4.yaml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/extractor/PYSEC-2006-4.yaml
13
reference_url http://www.debian.org/security/2006/dsa-1081
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2006/dsa-1081
14
reference_url http://www.gentoo.org/security/en/glsa/glsa-200605-14.xml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.gentoo.org/security/en/glsa/glsa-200605-14.xml
15
reference_url http://www.novell.com/linux/security/advisories/2006-06-02.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006-06-02.html
16
reference_url http://www.securityfocus.com/archive/1/434288/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/434288/100/0/threaded
17
reference_url http://www.securityfocus.com/bid/18021
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/18021
18
reference_url http://www.vupen.com/english/advisories/2006/1848
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/1848
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-2458
reference_id CVE-2006-2458
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2006-2458
20
reference_url https://github.com/advisories/GHSA-f836-7jqw-3684
reference_id GHSA-f836-7jqw-3684
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f836-7jqw-3684
21
reference_url https://security.gentoo.org/glsa/200605-14
reference_id GLSA-200605-14
reference_type
scores
url https://security.gentoo.org/glsa/200605-14
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/1801.txt
reference_id OSVDB-25664;CVE-2006-2458;OSVDB-25663
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/1801.txt
fixed_packages
0
url pkg:deb/debian/libextractor@0.5.16-2
purl pkg:deb/debian/libextractor@0.5.16-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-xzye-g5rw-fyh5
13
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2
aliases CVE-2006-2458, GHSA-f836-7jqw-3684, PYSEC-2006-4
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysee-ywmb-zkep
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2