Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1037226?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "type": "deb", "namespace": "debian", "name": "libextractor", "version": "0.5.16-2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "1:1.11-2", "latest_non_vulnerable_version": "1:1.11-2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73738?format=api", "vulnerability_id": "VCID-1xdm-2dj5-jkc7", "summary": "security update", "references": [ { "reference_url": "http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14347", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68508", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68494", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68392", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68412", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68432", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68459", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68501", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68489", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68456", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14347" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430" }, { "reference_url": "https://gnunet.org/bugs/view.php?id=5399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/bugs/view.php?id=5399" }, { "reference_url": "https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4290", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4290" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904905", "reference_id": "904905", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904905" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14347", "reference_id": "CVE-2018-14347", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14347" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037232?format=api", "purl": "pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2018-14347" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1xdm-2dj5-jkc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76573?format=api", "vulnerability_id": "VCID-2auw-wc6u-ekcs", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20431", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.68713", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.6866", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.68597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.68615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.68633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.6861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.68661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.68679", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.68703", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00572", "scoring_system": "epss", "scoring_elements": "0.68689", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20431" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431" }, { "reference_url": "https://gnunet.org/bugs/view.php?id=5494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/bugs/view.php?id=5494" }, { "reference_url": "https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7" }, { "reference_url": "https://gnunet.org/git/libextractor.git/tree/ChangeLog", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/git/libextractor.git/tree/ChangeLog" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4361" }, { "reference_url": "http://www.securityfocus.com/bid/106300", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106300" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917213", "reference_id": "917213", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917213" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20431", "reference_id": "CVE-2018-20431", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20431" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037232?format=api", "purl": "pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2018-20431" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2auw-wc6u-ekcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93149?format=api", "vulnerability_id": "VCID-3bg1-rwze-kuhw", "summary": "In GNU Libextractor 1.4, there is a heap-based buffer overflow in the EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related to processiTXt and stndup.", "references": [ { "reference_url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62742", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62734", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62587", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62645", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62677", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.6271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62729", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62718", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00432", "scoring_system": "epss", "scoring_elements": "0.62695", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15601" }, { "reference_url": "https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz", "reference_id": "", "reference_type": "", "scores": [], "url": "https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15601", "reference_id": "CVE-2017-15601", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15601" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2017-15601" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3bg1-rwze-kuhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93150?format=api", "vulnerability_id": "VCID-5ymr-xk84-8uh3", "summary": "In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted size.", "references": [ { "reference_url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61241", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61073", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61151", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61179", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61192", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61207", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61227", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61195", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15602" }, { "reference_url": "https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz", "reference_id": "", "reference_type": "", "scores": [], "url": "https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15602", "reference_id": "CVE-2017-15602", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15602" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2017-15602" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ymr-xk84-8uh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76572?format=api", "vulnerability_id": "VCID-ahs6-mesc-yqhm", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20430", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68655", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68644", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68539", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68557", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68575", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68553", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68622", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68647", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68605", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431" }, { "reference_url": "https://gnunet.org/bugs/view.php?id=5493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/bugs/view.php?id=5493" }, { "reference_url": "https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110" }, { "reference_url": "https://gnunet.org/git/libextractor.git/tree/ChangeLog", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/git/libextractor.git/tree/ChangeLog" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4361" }, { "reference_url": "http://www.securityfocus.com/bid/106300", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106300" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917214", "reference_id": "917214", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917214" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20430", "reference_id": "CVE-2018-20430", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20430" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037232?format=api", "purl": "pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2018-20430" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahs6-mesc-yqhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93168?format=api", "vulnerability_id": "VCID-bdsg-x852-wfgn", "summary": "GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67249", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67284", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67296", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67298", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01003", "scoring_system": "epss", "scoring_elements": "0.76973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01003", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01003", "scoring_system": "epss", "scoring_elements": "0.76991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01003", "scoring_system": "epss", "scoring_elements": "0.76956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01003", "scoring_system": "epss", "scoring_elements": "0.77005", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17440" }, { "reference_url": "https://bugs.debian.org/883528#35", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/883528#35" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17440" }, { "reference_url": "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e" }, { "reference_url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html" }, { "reference_url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html" }, { "reference_url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html" }, { "reference_url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html" }, { "reference_url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html" }, { "reference_url": "http://www.securityfocus.com/bid/102116", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102116" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883528", "reference_id": "883528", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883528" }, { "reference_url": "https://security.archlinux.org/ASA-201807-16", "reference_id": "ASA-201807-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201807-16" }, { "reference_url": "https://security.archlinux.org/AVG-541", "reference_id": "AVG-541", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-541" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17440", "reference_id": "CVE-2017-17440", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17440" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2017-17440" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdsg-x852-wfgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73737?format=api", "vulnerability_id": "VCID-kpcg-4av4-gka8", "summary": "security update", "references": [ { "reference_url": "http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00001.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14346", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65862", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65847", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.6578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65827", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65857", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65844", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65814", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430" }, { "reference_url": "https://gnunet.org/git/libextractor.git/commit/?id=ad19e7fe0adc99d5710eff1ed48d91a7b75a950e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gnunet.org/git/libextractor.git/commit/?id=ad19e7fe0adc99d5710eff1ed48d91a7b75a950e" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4290", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4290" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904903", "reference_id": "904903", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904903" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14346", "reference_id": "CVE-2018-14346", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14346" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037232?format=api", "purl": "pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2018-14346" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcg-4av4-gka8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73739?format=api", "vulnerability_id": "VCID-kxcz-d7a4-77e8", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16430", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80098", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80167", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80151", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80143", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80173", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01358", "scoring_system": "epss", "scoring_elements": "0.80174", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907987", "reference_id": "907987", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907987" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037232?format=api", "purl": "pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2018-16430" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kxcz-d7a4-77e8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93154?format=api", "vulnerability_id": "VCID-tc8j-82se-qfbk", "summary": "In GNU Libextractor 1.4, there is an out-of-bounds read in the EXTRACTOR_dvi_extract_method function in plugins/dvi_extractor.c.", "references": [ { "reference_url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15922", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39255", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39231", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39284", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39077", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39262", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39286", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39287", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39249", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15922" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html" }, { "reference_url": "http://www.securityfocus.com/bid/101595", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101595" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880016", "reference_id": "880016", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880016" }, { "reference_url": "https://security.archlinux.org/ASA-201711-16", "reference_id": "ASA-201711-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-16" }, { "reference_url": "https://security.archlinux.org/AVG-471", "reference_id": "AVG-471", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-471" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15922", "reference_id": "CVE-2017-15922", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15922" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2017-15922" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8j-82se-qfbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94047?format=api", "vulnerability_id": "VCID-tubv-28uu-2uh8", "summary": "GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78129", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78094", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78038", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78047", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78076", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78058", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78089", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78115", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78097", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15531" }, { "reference_url": "https://bugs.gnunet.org/view.php?id=5846", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.gnunet.org/view.php?id=5846" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15531" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935553", "reference_id": "935553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935553" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15531", "reference_id": "CVE-2019-15531", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15531" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1053036?format=api", "purl": "pkg:deb/debian/libextractor@1:1.11-2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.11-2" } ], "aliases": [ "CVE-2019-15531" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tubv-28uu-2uh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93146?format=api", "vulnerability_id": "VCID-x3k6-yrp9-9ud9", "summary": "In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c.", "references": [ { "reference_url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00003.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2017/10/11/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2017/10/11/1" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15267", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71149", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71141", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71047", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71074", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71091", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71112", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71095", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15267" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15267" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html" }, { "reference_url": "http://www.securityfocus.com/bid/101272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101272" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314", "reference_id": "878314", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15267", "reference_id": "CVE-2017-15267", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15267" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2017-15267" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x3k6-yrp9-9ud9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93145?format=api", "vulnerability_id": "VCID-xyab-d3gr-zkdw", "summary": "In GNU Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in wav_extractor.c via a zero sample rate.", "references": [ { "reference_url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00002.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2017/10/11/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2017/10/11/1" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15266", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58461", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58456", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58308", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58393", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.5844", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58446", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58463", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58443", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58424", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15266" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15266" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html" }, { "reference_url": "http://www.securityfocus.com/bid/101271", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101271" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314", "reference_id": "878314", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15266", "reference_id": "CVE-2017-15266", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15266" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2017-15266" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyab-d3gr-zkdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34258?format=api", "vulnerability_id": "VCID-xzye-g5rw-fyh5", "summary": "Multiple vulnerabilities have been found in GraphicsMagick,\n allowing remote attackers to execute arbitrary code or cause a Denial of\n Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26198", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26078", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2613", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26139", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31157", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31113", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31146", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31126", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=537941", "reference_id": "537941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537941" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797", "reference_id": "559797", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801", "reference_id": "559801", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806", "reference_id": "559806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809", "reference_id": "559809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811", "reference_id": "559811", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814", "reference_id": "559814", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815", "reference_id": "559815", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816", "reference_id": "559816", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819", "reference_id": "559819", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822", "reference_id": "559822", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824", "reference_id": "559824", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825", "reference_id": "559825", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826", "reference_id": "559826", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829", "reference_id": "559829", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831", "reference_id": "559831", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832", "reference_id": "559832", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833", "reference_id": "559833", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834", "reference_id": "559834", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835", "reference_id": "559835", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836", "reference_id": "559836", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837", "reference_id": "559837", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840", "reference_id": "559840", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844", "reference_id": "559844", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845", "reference_id": "559845", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436", "reference_id": "702436", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436" }, { "reference_url": "https://security.gentoo.org/glsa/201311-10", "reference_id": "GLSA-201311-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-10" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1646", "reference_id": "RHSA-2009:1646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0039", "reference_id": "RHSA-2010:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0039" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037228?format=api", "purl": "pkg:deb/debian/libextractor@1:0.5.23%2Bdfsg-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:0.5.23%252Bdfsg-7" } ], "aliases": [ "CVE-2009-3736" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xzye-g5rw-fyh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93148?format=api", "vulnerability_id": "VCID-zd6d-q8xx-zud6", "summary": "In GNU Libextractor 1.4, there is a NULL Pointer Dereference in the EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.", "references": [ { "reference_url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82058", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.81993", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82005", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82027", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82022", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82049", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82056", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82076", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01659", "scoring_system": "epss", "scoring_elements": "0.82066", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15600" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15600" }, { "reference_url": "https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz", "reference_id": "", "reference_type": "", "scores": [], "url": "https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15600", "reference_id": "CVE-2017-15600", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15600" }, { "reference_url": "https://usn.ubuntu.com/4641-1/", "reference_id": "USN-4641-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4641-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051188?format=api", "purl": "pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-tubv-28uu-2uh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1" } ], "aliases": [ "CVE-2017-15600" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zd6d-q8xx-zud6" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49939?format=api", "vulnerability_id": "VCID-1z9b-trb7-2ubp", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92772", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92732", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92742", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92761", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3626" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18312" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18329" }, { "reference_url": "http://secunia.com/advisories/18332", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18332" }, { "reference_url": "http://secunia.com/advisories/18334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18334" }, { "reference_url": "http://secunia.com/advisories/18335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18335" }, { "reference_url": "http://secunia.com/advisories/18338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18338" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18373", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18373" }, { "reference_url": "http://secunia.com/advisories/18375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18375" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18414" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18423" }, { "reference_url": "http://secunia.com/advisories/18425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18425" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18463" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18642" }, { "reference_url": "http://secunia.com/advisories/18644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18644" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/16143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16143" }, { "reference_url": "http://www.trustix.org/errata/2006/0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0002/" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0047" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617828", "reference_id": "1617828", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617828" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3626", "reference_id": "CVE-2005-3626", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3626" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://security.gentoo.org/glsa/200601-17", "reference_id": "GLSA-200601-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0163", "reference_id": "RHSA-2006:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0177", "reference_id": "RHSA-2006:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0177" }, { "reference_url": "https://usn.ubuntu.com/236-1/", "reference_id": "USN-236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-1/" }, { "reference_url": "https://usn.ubuntu.com/236-2/", "reference_id": "USN-236-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-3626" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1z9b-trb7-2ubp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49942?format=api", "vulnerability_id": "VCID-4p26-wkq3-v3b2", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3628.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85873", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85777", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85789", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85813", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85832", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85842", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85857", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85854", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.8585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85868", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617830", "reference_id": "1617830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617830" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3628", "reference_id": "CVE-2005-3628", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3628" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:867", "reference_id": "RHSA-2005:867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:878", "reference_id": "RHSA-2005:878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-3628" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4p26-wkq3-v3b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34312?format=api", "vulnerability_id": "VCID-5q1h-7uk2-nkhx", "summary": "Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n Poppler potentially resulting in the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-868.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3193", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86675", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86662", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86655", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86668", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193" }, { "reference_url": "http://secunia.com/advisories/17897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17897" }, { "reference_url": "http://secunia.com/advisories/17912", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17912" }, { "reference_url": "http://secunia.com/advisories/17916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17916" }, { "reference_url": "http://secunia.com/advisories/17920", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17920" }, { "reference_url": "http://secunia.com/advisories/17926", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17926" }, { "reference_url": "http://secunia.com/advisories/17929", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17929" }, { "reference_url": "http://secunia.com/advisories/17940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17940" }, { "reference_url": "http://secunia.com/advisories/17955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17955" }, { "reference_url": "http://secunia.com/advisories/17956", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17956" }, { "reference_url": "http://secunia.com/advisories/17959", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17959" }, { "reference_url": "http://secunia.com/advisories/17976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17976" }, { "reference_url": "http://secunia.com/advisories/18009", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18009" }, { "reference_url": "http://secunia.com/advisories/18055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18055" }, { "reference_url": "http://secunia.com/advisories/18061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18061" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18189" }, { "reference_url": "http://secunia.com/advisories/18191", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18191" }, { "reference_url": "http://secunia.com/advisories/18192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18192" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18336" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18520", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18520" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19125" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/19797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19797" }, { "reference_url": "http://secunia.com/advisories/19798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19798" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "http://secunia.com/advisories/26413", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26413" }, { "reference_url": "http://securityreason.com/securityalert/236", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/236" }, { "reference_url": "http://securitytracker.com/id?1015309", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015309" }, { "reference_url": "http://securitytracker.com/id?1015324", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015324" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23441" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1609" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-1.txt" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-840.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-867.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-878.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15721" }, { "reference_url": "http://www.trustix.org/errata/2005/0072/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0072/" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-227-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-227-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2787" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2789" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2790" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2856" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617798", "reference_id": "1617798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617798" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281", "reference_id": "342281", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288", "reference_id": "342288", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3193", "reference_id": "CVE-2005-3193", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3193" }, { "reference_url": "https://security.gentoo.org/glsa/200512-08", "reference_id": "GLSA-200512-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200512-08" }, { "reference_url": "https://security.gentoo.org/glsa/200603-02", "reference_id": "GLSA-200603-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200603-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:867", "reference_id": "RHSA-2005:867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:878", "reference_id": "RHSA-2005:878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://usn.ubuntu.com/227-1/", "reference_id": "USN-227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/227-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-3193" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5q1h-7uk2-nkhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34308?format=api", "vulnerability_id": "VCID-8uds-zs9k-47en", "summary": "Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n Poppler potentially resulting in the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-868.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3191", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86675", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86662", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86655", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86668", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191" }, { "reference_url": "http://secunia.com/advisories/17897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17897" }, { "reference_url": "http://secunia.com/advisories/17908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17908" }, { "reference_url": "http://secunia.com/advisories/17912", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17912" }, { "reference_url": "http://secunia.com/advisories/17916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17916" }, { "reference_url": "http://secunia.com/advisories/17920", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17920" }, { "reference_url": "http://secunia.com/advisories/17921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17921" }, { "reference_url": "http://secunia.com/advisories/17926", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17926" }, { "reference_url": "http://secunia.com/advisories/17929", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17929" }, { "reference_url": "http://secunia.com/advisories/17940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17940" }, { "reference_url": "http://secunia.com/advisories/17955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17955" }, { "reference_url": "http://secunia.com/advisories/17976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17976" }, { "reference_url": "http://secunia.com/advisories/18009", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18009" }, { "reference_url": "http://secunia.com/advisories/18055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18055" }, { "reference_url": "http://secunia.com/advisories/18061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18061" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18189" }, { "reference_url": "http://secunia.com/advisories/18191", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18191" }, { "reference_url": "http://secunia.com/advisories/18192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18192" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18336" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18503" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18549", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18549" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/19797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19797" }, { "reference_url": "http://secunia.com/advisories/19798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19798" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "http://secunia.com/advisories/26413", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26413" }, { "reference_url": "http://securityreason.com/securityalert/233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/233" }, { "reference_url": "http://securityreason.com/securityalert/234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/234" }, { "reference_url": "http://securitytracker.com/id?1015309", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015309" }, { "reference_url": "http://securitytracker.com/id?1015324", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015324" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1609" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-1.txt" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-840.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-867.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-878.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15726", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15726" }, { "reference_url": "http://www.securityfocus.com/bid/15727", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15727" }, { "reference_url": "http://www.trustix.org/errata/2005/0072/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0072/" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-227-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-227-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2786", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2786" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2787" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2788" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2789" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2790" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2856" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617796", "reference_id": "1617796", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617796" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281", "reference_id": "342281", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288", "reference_id": "342288", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3191", "reference_id": "CVE-2005-3191", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3191" }, { "reference_url": "https://security.gentoo.org/glsa/200512-08", "reference_id": "GLSA-200512-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200512-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:867", "reference_id": "RHSA-2005:867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:878", "reference_id": "RHSA-2005:878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://usn.ubuntu.com/227-1/", "reference_id": "USN-227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/227-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-3191" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uds-zs9k-47en" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49940?format=api", "vulnerability_id": "VCID-bkr4-sab1-5ka2", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3627", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88929", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88863", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88887", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88888", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88906", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88912", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88923", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88931", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3627" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18312" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18329" }, { "reference_url": "http://secunia.com/advisories/18332", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18332" }, { "reference_url": "http://secunia.com/advisories/18334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18334" }, { "reference_url": "http://secunia.com/advisories/18335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18335" }, { "reference_url": "http://secunia.com/advisories/18338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18338" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18373", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18373" }, { "reference_url": "http://secunia.com/advisories/18375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18375" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18414" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18423" }, { "reference_url": "http://secunia.com/advisories/18425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18425" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18463" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18642" }, { "reference_url": "http://secunia.com/advisories/18644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18644" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24024" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24025" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/16143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16143" }, { "reference_url": "http://www.trustix.org/errata/2006/0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0002/" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0047" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617829", "reference_id": "1617829", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617829" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076", "reference_id": "346076", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3627", "reference_id": "CVE-2005-3627", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3627" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://security.gentoo.org/glsa/200601-17", "reference_id": "GLSA-200601-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0163", "reference_id": "RHSA-2006:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0177", "reference_id": "RHSA-2006:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0177" }, { "reference_url": "https://usn.ubuntu.com/236-1/", "reference_id": "USN-236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-1/" }, { "reference_url": "https://usn.ubuntu.com/236-2/", "reference_id": "USN-236-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-3627" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bkr4-sab1-5ka2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89005?format=api", "vulnerability_id": "VCID-durs-kj4r-jbf2", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2097", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21924", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21883", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22045", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22098", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21956", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22011", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22026", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21927", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097" }, { "reference_url": "http://secunia.com/advisories/17277", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17277" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/21339", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21339" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-780", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-780" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1136" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:138", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:138" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-670.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-670.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-671.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-671.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-706.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-706.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-708.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-708.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/14529", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/14529" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617684", "reference_id": "1617684", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617684" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462", "reference_id": "322462", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464", "reference_id": "324464", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2097", "reference_id": "CVE-2005-2097", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:670", "reference_id": "RHSA-2005:670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:671", "reference_id": "RHSA-2005:671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:706", "reference_id": "RHSA-2005:706", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:706" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:708", "reference_id": "RHSA-2005:708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:708" }, { "reference_url": "https://usn.ubuntu.com/163-1/", "reference_id": "USN-163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/163-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-2097" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-durs-kj4r-jbf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34873?format=api", "vulnerability_id": "VCID-fct6-695j-t7bs", "summary": "PDFKit and ImageKits are vulnerable to an integer overflow and a stack\n overflow allowing for the user-assisted execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92529", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92541", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92577", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92576", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194", "reference_id": "248194", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460", "reference_id": "435460", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462", "reference_id": "435462", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462" }, { "reference_url": "https://security.gentoo.org/glsa/200709-12", "reference_id": "GLSA-200709-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200709-12" }, { "reference_url": "https://security.gentoo.org/glsa/200709-17", "reference_id": "GLSA-200709-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200709-17" }, { "reference_url": "https://security.gentoo.org/glsa/200710-08", "reference_id": "GLSA-200710-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-08" }, { "reference_url": "https://security.gentoo.org/glsa/200710-20", "reference_id": "GLSA-200710-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0720", "reference_id": "RHSA-2007:0720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0729", "reference_id": "RHSA-2007:0729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0730", "reference_id": "RHSA-2007:0730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0731", "reference_id": "RHSA-2007:0731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0732", "reference_id": "RHSA-2007:0732", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0732" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0735", "reference_id": "RHSA-2007:0735", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0735" }, { "reference_url": "https://usn.ubuntu.com/496-1/", "reference_id": "USN-496-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/496-1/" }, { "reference_url": "https://usn.ubuntu.com/496-2/", "reference_id": "USN-496-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/496-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2007-3387" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fct6-695j-t7bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61422?format=api", "vulnerability_id": "VCID-kgk7-hqby-wkez", "summary": "Poppler and various KDE components are vulnerable to multiple memory\n management issues possibly resulting in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.9618", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96196", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96199", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96212", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96217", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96226", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96231", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4352" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=345101", "reference_id": "345101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=345101" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628", "reference_id": "450628", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629", "reference_id": "450629", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629" }, { "reference_url": "https://security.gentoo.org/glsa/200711-22", "reference_id": "GLSA-200711-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200711-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1021", "reference_id": "RHSA-2007:1021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1022", "reference_id": "RHSA-2007:1022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1024", "reference_id": "RHSA-2007:1024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1025", "reference_id": "RHSA-2007:1025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1026", "reference_id": "RHSA-2007:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1027", "reference_id": "RHSA-2007:1027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1029", "reference_id": "RHSA-2007:1029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1030", "reference_id": "RHSA-2007:1030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1030" }, { "reference_url": "https://usn.ubuntu.com/542-1/", "reference_id": "USN-542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-1/" }, { "reference_url": "https://usn.ubuntu.com/542-2/", "reference_id": "USN-542-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2007-4352" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kgk7-hqby-wkez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49937?format=api", "vulnerability_id": "VCID-mg1z-d7y8-dfaj", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91725", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91676", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91682", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91691", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91703", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.9171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91713", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91716", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91712", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91732", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3624" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18312" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18329" }, { "reference_url": "http://secunia.com/advisories/18332", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18332" }, { "reference_url": "http://secunia.com/advisories/18334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18334" }, { "reference_url": "http://secunia.com/advisories/18338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18338" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18373", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18373" }, { "reference_url": "http://secunia.com/advisories/18375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18375" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18414" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18423" }, { "reference_url": "http://secunia.com/advisories/18425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18425" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18463" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18642" }, { "reference_url": "http://secunia.com/advisories/18644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18644" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/16143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16143" }, { "reference_url": "http://www.trustix.org/errata/2006/0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0002/" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0047" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617826", "reference_id": "1617826", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617826" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076", "reference_id": "346076", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3624", "reference_id": "CVE-2005-3624", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3624" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://security.gentoo.org/glsa/200601-17", "reference_id": "GLSA-200601-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0163", "reference_id": "RHSA-2006:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0177", "reference_id": "RHSA-2006:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0177" }, { "reference_url": "https://usn.ubuntu.com/236-1/", "reference_id": "USN-236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-1/" }, { "reference_url": "https://usn.ubuntu.com/236-2/", "reference_id": "USN-236-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-3624" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mg1z-d7y8-dfaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50210?format=api", "vulnerability_id": "VCID-qayv-8u9a-83h4", "summary": "KPdf includes vulnerable Xpdf code to handle PDF files, making it\n vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0301", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86717", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86745", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86783", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86794", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86798", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0301" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617882", "reference_id": "1617882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617882" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783", "reference_id": "350783", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783" }, { "reference_url": "https://security.gentoo.org/glsa/200602-04", "reference_id": "GLSA-200602-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200602-04" }, { "reference_url": "https://security.gentoo.org/glsa/200602-05", "reference_id": "GLSA-200602-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200602-05" }, { "reference_url": "https://security.gentoo.org/glsa/200602-12", "reference_id": "GLSA-200602-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200602-12" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0201", "reference_id": "RHSA-2006:0201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0206", "reference_id": "RHSA-2006:0206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0206" }, { "reference_url": "https://usn.ubuntu.com/249-1/", "reference_id": "USN-249-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/249-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2006-0301" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qayv-8u9a-83h4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61424?format=api", "vulnerability_id": "VCID-sv3r-4tym-qua5", "summary": "Poppler and various KDE components are vulnerable to multiple memory\n management issues possibly resulting in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5393", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94355", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94375", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94389", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94392", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94394", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94408", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94413", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=345121", "reference_id": "345121", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=345121" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628", "reference_id": "450628", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629", "reference_id": "450629", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629" }, { "reference_url": "https://security.gentoo.org/glsa/200711-22", "reference_id": "GLSA-200711-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200711-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1021", "reference_id": "RHSA-2007:1021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1022", "reference_id": "RHSA-2007:1022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1023", "reference_id": "RHSA-2007:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1024", "reference_id": "RHSA-2007:1024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1025", "reference_id": "RHSA-2007:1025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1026", "reference_id": "RHSA-2007:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1027", "reference_id": "RHSA-2007:1027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1028", "reference_id": "RHSA-2007:1028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1029", "reference_id": "RHSA-2007:1029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1030", "reference_id": "RHSA-2007:1030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1031", "reference_id": "RHSA-2007:1031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1051", "reference_id": "RHSA-2007:1051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1051" }, { "reference_url": "https://usn.ubuntu.com/542-1/", "reference_id": "USN-542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-1/" }, { "reference_url": "https://usn.ubuntu.com/542-2/", "reference_id": "USN-542-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2007-5393" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sv3r-4tym-qua5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49938?format=api", "vulnerability_id": "VCID-utex-65f9-53cq", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93548", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.9349", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93499", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93506", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93515", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93518", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93522", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93542", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3625" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18312" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18329" }, { "reference_url": "http://secunia.com/advisories/18332", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18332" }, { "reference_url": "http://secunia.com/advisories/18334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18334" }, { "reference_url": "http://secunia.com/advisories/18335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18335" }, { "reference_url": "http://secunia.com/advisories/18338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18338" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18373", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18373" }, { "reference_url": "http://secunia.com/advisories/18375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18375" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18414" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18423" }, { "reference_url": "http://secunia.com/advisories/18425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18425" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18463" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18642" }, { "reference_url": "http://secunia.com/advisories/18644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18644" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/16143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16143" }, { "reference_url": "http://www.trustix.org/errata/2006/0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0002/" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0047" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617827", "reference_id": "1617827", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617827" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076", "reference_id": "346076", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3625", "reference_id": "CVE-2005-3625", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3625" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://security.gentoo.org/glsa/200601-17", "reference_id": "GLSA-200601-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0163", "reference_id": "RHSA-2006:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0177", "reference_id": "RHSA-2006:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0177" }, { "reference_url": "https://usn.ubuntu.com/236-1/", "reference_id": "USN-236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-1/" }, { "reference_url": "https://usn.ubuntu.com/236-2/", "reference_id": "USN-236-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-3625" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-utex-65f9-53cq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61423?format=api", "vulnerability_id": "VCID-wpgs-8fw5-wbhe", "summary": "Poppler and various KDE components are vulnerable to multiple memory\n management issues possibly resulting in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5392", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91135", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91143", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91168", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=345111", "reference_id": "345111", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=345111" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628", "reference_id": "450628", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629", "reference_id": "450629", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629" }, { "reference_url": "https://security.gentoo.org/glsa/200711-22", "reference_id": "GLSA-200711-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200711-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1021", "reference_id": "RHSA-2007:1021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1022", "reference_id": "RHSA-2007:1022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1024", "reference_id": "RHSA-2007:1024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1025", "reference_id": "RHSA-2007:1025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1026", "reference_id": "RHSA-2007:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1027", "reference_id": "RHSA-2007:1027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1029", "reference_id": "RHSA-2007:1029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1030", "reference_id": "RHSA-2007:1030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1030" }, { "reference_url": "https://usn.ubuntu.com/542-1/", "reference_id": "USN-542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-1/" }, { "reference_url": "https://usn.ubuntu.com/542-2/", "reference_id": "USN-542-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2007-5392" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpgs-8fw5-wbhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34310?format=api", "vulnerability_id": "VCID-xqh5-sxfb-gueh", "summary": "Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n Poppler potentially resulting in the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-868.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93886", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.9382", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93838", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.9388", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3192" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192" }, { "reference_url": "http://secunia.com/advisories/17897/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17897/" }, { "reference_url": "http://secunia.com/advisories/17908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17908" }, { "reference_url": "http://secunia.com/advisories/17912", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17912" }, { "reference_url": "http://secunia.com/advisories/17916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17916" }, { "reference_url": "http://secunia.com/advisories/17920", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17920" }, { "reference_url": "http://secunia.com/advisories/17921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17921" }, { "reference_url": "http://secunia.com/advisories/17926", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17926" }, { "reference_url": "http://secunia.com/advisories/17929", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17929" }, { "reference_url": "http://secunia.com/advisories/17940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17940" }, { "reference_url": "http://secunia.com/advisories/17955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17955" }, { "reference_url": "http://secunia.com/advisories/17976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17976" }, { "reference_url": "http://secunia.com/advisories/18009", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18009" }, { "reference_url": "http://secunia.com/advisories/18055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18055" }, { "reference_url": "http://secunia.com/advisories/18061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18061" }, { "reference_url": "http://secunia.com/advisories/18189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18189" }, { "reference_url": "http://secunia.com/advisories/18191", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18191" }, { "reference_url": "http://secunia.com/advisories/18192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18192" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18336" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18503" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18549", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18549" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/19797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19797" }, { "reference_url": "http://secunia.com/advisories/19798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19798" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "http://secunia.com/advisories/26413", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26413" }, { "reference_url": "http://securityreason.com/securityalert/235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/235" }, { "reference_url": "http://securityreason.com/securityalert/240", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/240" }, { "reference_url": "http://securitytracker.com/id?1015309", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015309" }, { "reference_url": "http://securitytracker.com/id?1015324", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015324" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23442" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1609" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-937" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-1.txt" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-840.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-867.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-878.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15725", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15725" }, { "reference_url": "http://www.trustix.org/errata/2005/0072/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0072/" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-227-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-227-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2755", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2755" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2786", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2786" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2787" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2788" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2789" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2790" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2856" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617797", "reference_id": "1617797", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617797" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281", "reference_id": "342281", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288", "reference_id": "342288", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3192", "reference_id": "CVE-2005-3192", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3192" }, { "reference_url": "https://security.gentoo.org/glsa/200512-08", "reference_id": "GLSA-200512-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200512-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:867", "reference_id": "RHSA-2005:867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:878", "reference_id": "RHSA-2005:878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://usn.ubuntu.com/227-1/", "reference_id": "USN-227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/227-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2005-3192" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqh5-sxfb-gueh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5166?format=api", "vulnerability_id": "VCID-ysee-ywmb-zkep", "summary": "Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote attackers to execute arbitrary code via (1) the asf_read_header function in the ASF plugin (plugins/asfextractor.c), and (2) the parse_trak_atom function in the QT plugin (plugins/qtextractor.c).", "references": [ { "reference_url": "http://gnunet.org/libextractor", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://gnunet.org/libextractor" }, { "reference_url": "http://gnunet.org/libextractor/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://gnunet.org/libextractor/" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95357", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95339", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95344", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95346", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95354", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95307", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19115", "scoring_system": "epss", "scoring_elements": "0.95318", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458" }, { "reference_url": "http://secunia.com/advisories/20150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20150" }, { "reference_url": "http://secunia.com/advisories/20160", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20160" }, { "reference_url": "http://secunia.com/advisories/20326", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20326" }, { "reference_url": "http://secunia.com/advisories/20457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20457" }, { "reference_url": "http://securityreason.com/securityalert/916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/916" }, { "reference_url": "http://securitytracker.com/id?1016118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1016118" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26531", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26531" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26532", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26532" }, { "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/extractor/PYSEC-2006-4.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/pypa/advisory-database/tree/main/vulns/extractor/PYSEC-2006-4.yaml" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1081", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.debian.org/security/2006/dsa-1081" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200605-14.xml", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-14.xml" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2006-06-02.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/434288/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/434288/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/18021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/18021" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/1848", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/1848" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2458", "reference_id": "CVE-2006-2458", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2458" }, { "reference_url": "https://github.com/advisories/GHSA-f836-7jqw-3684", "reference_id": "GHSA-f836-7jqw-3684", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-f836-7jqw-3684" }, { "reference_url": "https://security.gentoo.org/glsa/200605-14", "reference_id": "GLSA-200605-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200605-14" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/1801.txt", "reference_id": "OSVDB-25664;CVE-2006-2458;OSVDB-25663", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/1801.txt" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037226?format=api", "purl": "pkg:deb/debian/libextractor@0.5.16-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1xdm-2dj5-jkc7" }, { "vulnerability": "VCID-2auw-wc6u-ekcs" }, { "vulnerability": "VCID-3bg1-rwze-kuhw" }, { "vulnerability": "VCID-5ymr-xk84-8uh3" }, { "vulnerability": "VCID-ahs6-mesc-yqhm" }, { "vulnerability": "VCID-bdsg-x852-wfgn" }, { "vulnerability": "VCID-kpcg-4av4-gka8" }, { "vulnerability": "VCID-kxcz-d7a4-77e8" }, { "vulnerability": "VCID-tc8j-82se-qfbk" }, { "vulnerability": "VCID-tubv-28uu-2uh8" }, { "vulnerability": "VCID-x3k6-yrp9-9ud9" }, { "vulnerability": "VCID-xyab-d3gr-zkdw" }, { "vulnerability": "VCID-xzye-g5rw-fyh5" }, { "vulnerability": "VCID-zd6d-q8xx-zud6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" } ], "aliases": [ "CVE-2006-2458", "GHSA-f836-7jqw-3684", "PYSEC-2006-4" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysee-ywmb-zkep" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@0.5.16-2" }