Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xpdf@3.00-13.7
Typedeb
Namespacedebian
Namexpdf
Version3.00-13.7
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.03-10
Latest_non_vulnerable_version3.03-10
Affected_by_vulnerabilities
0
url VCID-1z9b-trb7-2ubp
vulnerability_id VCID-1z9b-trb7-2ubp
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
4
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0177.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0177.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3626
reference_id
reference_type
scores
0
value 0.09332
scoring_system epss
scoring_elements 0.92776
published_at 2026-04-21T12:55:00Z
1
value 0.09332
scoring_system epss
scoring_elements 0.92732
published_at 2026-04-01T12:55:00Z
2
value 0.09332
scoring_system epss
scoring_elements 0.92739
published_at 2026-04-02T12:55:00Z
3
value 0.09332
scoring_system epss
scoring_elements 0.92745
published_at 2026-04-04T12:55:00Z
4
value 0.09332
scoring_system epss
scoring_elements 0.92742
published_at 2026-04-07T12:55:00Z
5
value 0.09332
scoring_system epss
scoring_elements 0.92752
published_at 2026-04-08T12:55:00Z
6
value 0.09332
scoring_system epss
scoring_elements 0.92756
published_at 2026-04-09T12:55:00Z
7
value 0.09332
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-11T12:55:00Z
8
value 0.09332
scoring_system epss
scoring_elements 0.92761
published_at 2026-04-13T12:55:00Z
9
value 0.09332
scoring_system epss
scoring_elements 0.92772
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3626
8
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626
10
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
11
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
12
reference_url http://secunia.com/advisories/18312
reference_id
reference_type
scores
url http://secunia.com/advisories/18312
13
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
14
reference_url http://secunia.com/advisories/18329
reference_id
reference_type
scores
url http://secunia.com/advisories/18329
15
reference_url http://secunia.com/advisories/18332
reference_id
reference_type
scores
url http://secunia.com/advisories/18332
16
reference_url http://secunia.com/advisories/18334
reference_id
reference_type
scores
url http://secunia.com/advisories/18334
17
reference_url http://secunia.com/advisories/18335
reference_id
reference_type
scores
url http://secunia.com/advisories/18335
18
reference_url http://secunia.com/advisories/18338
reference_id
reference_type
scores
url http://secunia.com/advisories/18338
19
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
20
reference_url http://secunia.com/advisories/18373
reference_id
reference_type
scores
url http://secunia.com/advisories/18373
21
reference_url http://secunia.com/advisories/18375
reference_id
reference_type
scores
url http://secunia.com/advisories/18375
22
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
23
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
24
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
25
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
26
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
27
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
28
reference_url http://secunia.com/advisories/18414
reference_id
reference_type
scores
url http://secunia.com/advisories/18414
29
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
30
reference_url http://secunia.com/advisories/18423
reference_id
reference_type
scores
url http://secunia.com/advisories/18423
31
reference_url http://secunia.com/advisories/18425
reference_id
reference_type
scores
url http://secunia.com/advisories/18425
32
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
33
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
34
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
35
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
36
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
37
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
38
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
39
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
40
reference_url http://secunia.com/advisories/18642
reference_id
reference_type
scores
url http://secunia.com/advisories/18642
41
reference_url http://secunia.com/advisories/18644
reference_id
reference_type
scores
url http://secunia.com/advisories/18644
42
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
43
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
44
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
45
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
46
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
47
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
48
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
49
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
50
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24026
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24026
51
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
52
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
53
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
54
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
55
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
56
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
57
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
58
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
59
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
60
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
61
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
62
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
63
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
64
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
65
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
66
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
67
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
68
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
69
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
70
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
71
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
72
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
74
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
75
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
76
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
77
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
78
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
79
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
80
reference_url http://www.redhat.com/support/errata/RHSA-2006-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0163.html
81
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
82
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
83
reference_url http://www.securityfocus.com/bid/16143
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16143
84
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
85
reference_url http://www.vupen.com/english/advisories/2006/0047
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0047
86
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
87
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617828
reference_id 1617828
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617828
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_id cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3626
reference_id CVE-2005-3626
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3626
216
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
217
reference_url https://security.gentoo.org/glsa/200601-17
reference_id GLSA-200601-17
reference_type
scores
url https://security.gentoo.org/glsa/200601-17
218
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
219
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
220
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
221
reference_url https://access.redhat.com/errata/RHSA-2006:0163
reference_id RHSA-2006:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0163
222
reference_url https://access.redhat.com/errata/RHSA-2006:0177
reference_id RHSA-2006:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0177
223
reference_url https://usn.ubuntu.com/236-1/
reference_id USN-236-1
reference_type
scores
url https://usn.ubuntu.com/236-1/
224
reference_url https://usn.ubuntu.com/236-2/
reference_id USN-236-2
reference_type
scores
url https://usn.ubuntu.com/236-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-3626
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z9b-trb7-2ubp
1
url VCID-35b2-jj1x-rkcf
vulnerability_id VCID-35b2-jj1x-rkcf
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3604
reference_id
reference_type
scores
0
value 0.07495
scoring_system epss
scoring_elements 0.91751
published_at 2026-04-01T12:55:00Z
1
value 0.07495
scoring_system epss
scoring_elements 0.9176
published_at 2026-04-02T12:55:00Z
2
value 0.07495
scoring_system epss
scoring_elements 0.91766
published_at 2026-04-04T12:55:00Z
3
value 0.07495
scoring_system epss
scoring_elements 0.91773
published_at 2026-04-07T12:55:00Z
4
value 0.07495
scoring_system epss
scoring_elements 0.91785
published_at 2026-04-08T12:55:00Z
5
value 0.07495
scoring_system epss
scoring_elements 0.91792
published_at 2026-04-09T12:55:00Z
6
value 0.07495
scoring_system epss
scoring_elements 0.91795
published_at 2026-04-11T12:55:00Z
7
value 0.07495
scoring_system epss
scoring_elements 0.91797
published_at 2026-04-12T12:55:00Z
8
value 0.07495
scoring_system epss
scoring_elements 0.91793
published_at 2026-04-13T12:55:00Z
9
value 0.07495
scoring_system epss
scoring_elements 0.91812
published_at 2026-04-16T12:55:00Z
10
value 0.07495
scoring_system epss
scoring_elements 0.91805
published_at 2026-04-18T12:55:00Z
11
value 0.07495
scoring_system epss
scoring_elements 0.91806
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526911
reference_id 526911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526911
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
8
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
9
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
10
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
11
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
12
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
13
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
14
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3604
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35b2-jj1x-rkcf
2
url VCID-4128-ep6n-hufz
vulnerability_id VCID-4128-ep6n-hufz
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3704
reference_id
reference_type
scores
0
value 0.01395
scoring_system epss
scoring_elements 0.80423
published_at 2026-04-21T12:55:00Z
1
value 0.01395
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-01T12:55:00Z
2
value 0.01395
scoring_system epss
scoring_elements 0.80345
published_at 2026-04-02T12:55:00Z
3
value 0.01395
scoring_system epss
scoring_elements 0.80365
published_at 2026-04-04T12:55:00Z
4
value 0.01395
scoring_system epss
scoring_elements 0.80354
published_at 2026-04-07T12:55:00Z
5
value 0.01395
scoring_system epss
scoring_elements 0.80382
published_at 2026-04-08T12:55:00Z
6
value 0.01395
scoring_system epss
scoring_elements 0.80392
published_at 2026-04-09T12:55:00Z
7
value 0.01395
scoring_system epss
scoring_elements 0.80411
published_at 2026-04-11T12:55:00Z
8
value 0.01395
scoring_system epss
scoring_elements 0.80396
published_at 2026-04-12T12:55:00Z
9
value 0.01395
scoring_system epss
scoring_elements 0.80389
published_at 2026-04-13T12:55:00Z
10
value 0.01395
scoring_system epss
scoring_elements 0.80418
published_at 2026-04-16T12:55:00Z
11
value 0.01395
scoring_system epss
scoring_elements 0.8042
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3704
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
14
reference_url http://secunia.com/advisories/42141
reference_id
reference_type
scores
url http://secunia.com/advisories/42141
15
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
16
reference_url http://secunia.com/advisories/42397
reference_id
reference_type
scores
url http://secunia.com/advisories/42397
17
reference_url http://secunia.com/advisories/42691
reference_id
reference_type
scores
url http://secunia.com/advisories/42691
18
reference_url http://secunia.com/advisories/43079
reference_id
reference_type
scores
url http://secunia.com/advisories/43079
19
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
20
reference_url http://www.debian.org/security/2010/dsa-2119
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2119
21
reference_url http://www.debian.org/security/2010/dsa-2135
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2135
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
27
reference_url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
28
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
29
reference_url http://www.redhat.com/support/errata/RHSA-2010-0749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0749.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2010-0751.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0751.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2010-0752.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0752.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2010-0753.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0753.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
34
reference_url http://www.securityfocus.com/bid/43841
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43841
35
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
36
reference_url http://www.vupen.com/english/advisories/2010/2897
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2897
37
reference_url http://www.vupen.com/english/advisories/2010/3097
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3097
38
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=638960
reference_id 638960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=638960
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3704
reference_id CVE-2010-3704
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3704
117
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
118
reference_url https://security.gentoo.org/glsa/201402-17
reference_id GLSA-201402-17
reference_type
scores
url https://security.gentoo.org/glsa/201402-17
119
reference_url https://access.redhat.com/errata/RHSA-2010:0749
reference_id RHSA-2010:0749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0749
120
reference_url https://access.redhat.com/errata/RHSA-2010:0751
reference_id RHSA-2010:0751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0751
121
reference_url https://access.redhat.com/errata/RHSA-2010:0752
reference_id RHSA-2010:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0752
122
reference_url https://access.redhat.com/errata/RHSA-2010:0753
reference_id RHSA-2010:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0753
123
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
124
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
125
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2010-3704
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4128-ep6n-hufz
3
url VCID-4p26-wkq3-v3b2
vulnerability_id VCID-4p26-wkq3-v3b2
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
1
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3628.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3628.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3628
reference_id
reference_type
scores
0
value 0.02683
scoring_system epss
scoring_elements 0.85866
published_at 2026-04-21T12:55:00Z
1
value 0.02683
scoring_system epss
scoring_elements 0.85777
published_at 2026-04-01T12:55:00Z
2
value 0.02683
scoring_system epss
scoring_elements 0.85789
published_at 2026-04-02T12:55:00Z
3
value 0.02683
scoring_system epss
scoring_elements 0.85808
published_at 2026-04-04T12:55:00Z
4
value 0.02683
scoring_system epss
scoring_elements 0.85813
published_at 2026-04-07T12:55:00Z
5
value 0.02683
scoring_system epss
scoring_elements 0.85832
published_at 2026-04-08T12:55:00Z
6
value 0.02683
scoring_system epss
scoring_elements 0.85842
published_at 2026-04-09T12:55:00Z
7
value 0.02683
scoring_system epss
scoring_elements 0.85857
published_at 2026-04-11T12:55:00Z
8
value 0.02683
scoring_system epss
scoring_elements 0.85854
published_at 2026-04-12T12:55:00Z
9
value 0.02683
scoring_system epss
scoring_elements 0.8585
published_at 2026-04-13T12:55:00Z
10
value 0.02683
scoring_system epss
scoring_elements 0.85868
published_at 2026-04-16T12:55:00Z
11
value 0.02683
scoring_system epss
scoring_elements 0.85873
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628
5
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
6
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
7
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
8
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
9
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
10
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
11
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
12
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
13
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
14
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
15
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
16
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
17
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
18
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
19
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
20
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
21
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
22
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
23
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
24
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
25
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287
26
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
27
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
28
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
29
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
30
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
31
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
32
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
33
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
34
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
35
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
36
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
37
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
38
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
39
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
40
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617830
reference_id 1617830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617830
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3628
reference_id CVE-2005-3628
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3628
44
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
45
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
46
reference_url https://access.redhat.com/errata/RHSA-2005:867
reference_id RHSA-2005:867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:867
47
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
48
reference_url https://access.redhat.com/errata/RHSA-2005:878
reference_id RHSA-2005:878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:878
49
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-3628
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4p26-wkq3-v3b2
4
url VCID-4yej-ag45-uuga
vulnerability_id VCID-4yej-ag45-uuga
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3703
reference_id
reference_type
scores
0
value 0.01118
scoring_system epss
scoring_elements 0.78249
published_at 2026-04-21T12:55:00Z
1
value 0.01118
scoring_system epss
scoring_elements 0.78164
published_at 2026-04-01T12:55:00Z
2
value 0.01118
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-02T12:55:00Z
3
value 0.01118
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-04T12:55:00Z
4
value 0.01118
scoring_system epss
scoring_elements 0.78185
published_at 2026-04-07T12:55:00Z
5
value 0.01118
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-08T12:55:00Z
6
value 0.01118
scoring_system epss
scoring_elements 0.78217
published_at 2026-04-09T12:55:00Z
7
value 0.01118
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-11T12:55:00Z
8
value 0.01118
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-12T12:55:00Z
9
value 0.01118
scoring_system epss
scoring_elements 0.78222
published_at 2026-04-13T12:55:00Z
10
value 0.01118
scoring_system epss
scoring_elements 0.78254
published_at 2026-04-16T12:55:00Z
11
value 0.01118
scoring_system epss
scoring_elements 0.78252
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3703
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703
8
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
9
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
12
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
13
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=639356
reference_id 639356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=639356
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3703
reference_id CVE-2010-3703
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3703
52
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
53
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
54
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2010-3703
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yej-ag45-uuga
5
url VCID-5q1h-7uk2-nkhx
vulnerability_id VCID-5q1h-7uk2-nkhx
summary
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
    Poppler potentially resulting in the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
2
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
4
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
5
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
6
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2005-868.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-868.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3193
reference_id
reference_type
scores
0
value 0.03031
scoring_system epss
scoring_elements 0.86675
published_at 2026-04-18T12:55:00Z
1
value 0.03031
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-01T12:55:00Z
2
value 0.03031
scoring_system epss
scoring_elements 0.86603
published_at 2026-04-02T12:55:00Z
3
value 0.03031
scoring_system epss
scoring_elements 0.86622
published_at 2026-04-07T12:55:00Z
4
value 0.03031
scoring_system epss
scoring_elements 0.86641
published_at 2026-04-08T12:55:00Z
5
value 0.03031
scoring_system epss
scoring_elements 0.86651
published_at 2026-04-09T12:55:00Z
6
value 0.03031
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-11T12:55:00Z
7
value 0.03031
scoring_system epss
scoring_elements 0.86662
published_at 2026-04-12T12:55:00Z
8
value 0.03031
scoring_system epss
scoring_elements 0.86655
published_at 2026-04-13T12:55:00Z
9
value 0.03031
scoring_system epss
scoring_elements 0.86668
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3193
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
11
reference_url http://secunia.com/advisories/17897
reference_id
reference_type
scores
url http://secunia.com/advisories/17897
12
reference_url http://secunia.com/advisories/17912
reference_id
reference_type
scores
url http://secunia.com/advisories/17912
13
reference_url http://secunia.com/advisories/17916
reference_id
reference_type
scores
url http://secunia.com/advisories/17916
14
reference_url http://secunia.com/advisories/17920
reference_id
reference_type
scores
url http://secunia.com/advisories/17920
15
reference_url http://secunia.com/advisories/17926
reference_id
reference_type
scores
url http://secunia.com/advisories/17926
16
reference_url http://secunia.com/advisories/17929
reference_id
reference_type
scores
url http://secunia.com/advisories/17929
17
reference_url http://secunia.com/advisories/17940
reference_id
reference_type
scores
url http://secunia.com/advisories/17940
18
reference_url http://secunia.com/advisories/17955
reference_id
reference_type
scores
url http://secunia.com/advisories/17955
19
reference_url http://secunia.com/advisories/17956
reference_id
reference_type
scores
url http://secunia.com/advisories/17956
20
reference_url http://secunia.com/advisories/17959
reference_id
reference_type
scores
url http://secunia.com/advisories/17959
21
reference_url http://secunia.com/advisories/17976
reference_id
reference_type
scores
url http://secunia.com/advisories/17976
22
reference_url http://secunia.com/advisories/18009
reference_id
reference_type
scores
url http://secunia.com/advisories/18009
23
reference_url http://secunia.com/advisories/18055
reference_id
reference_type
scores
url http://secunia.com/advisories/18055
24
reference_url http://secunia.com/advisories/18061
reference_id
reference_type
scores
url http://secunia.com/advisories/18061
25
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
26
reference_url http://secunia.com/advisories/18189
reference_id
reference_type
scores
url http://secunia.com/advisories/18189
27
reference_url http://secunia.com/advisories/18191
reference_id
reference_type
scores
url http://secunia.com/advisories/18191
28
reference_url http://secunia.com/advisories/18192
reference_id
reference_type
scores
url http://secunia.com/advisories/18192
29
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
30
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
31
reference_url http://secunia.com/advisories/18336
reference_id
reference_type
scores
url http://secunia.com/advisories/18336
32
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
33
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
34
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
35
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
36
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
37
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
38
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
39
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
40
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
41
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
42
reference_url http://secunia.com/advisories/18520
reference_id
reference_type
scores
url http://secunia.com/advisories/18520
43
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
44
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
45
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
46
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
47
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
48
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
49
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
50
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
51
reference_url http://secunia.com/advisories/19125
reference_id
reference_type
scores
url http://secunia.com/advisories/19125
52
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
53
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
54
reference_url http://secunia.com/advisories/19797
reference_id
reference_type
scores
url http://secunia.com/advisories/19797
55
reference_url http://secunia.com/advisories/19798
reference_id
reference_type
scores
url http://secunia.com/advisories/19798
56
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
57
reference_url http://secunia.com/advisories/26413
reference_id
reference_type
scores
url http://secunia.com/advisories/26413
58
reference_url http://securityreason.com/securityalert/236
reference_id
reference_type
scores
url http://securityreason.com/securityalert/236
59
reference_url http://securitytracker.com/id?1015309
reference_id
reference_type
scores
url http://securitytracker.com/id?1015309
60
reference_url http://securitytracker.com/id?1015324
reference_id
reference_type
scores
url http://securitytracker.com/id?1015324
61
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23441
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23441
62
reference_url https://issues.rpath.com/browse/RPL-1609
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1609
63
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
64
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
65
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440
66
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
67
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
68
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
69
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
70
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
71
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
72
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
73
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
74
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
75
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
76
reference_url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
77
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
78
reference_url http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml
79
reference_url http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true
80
reference_url http://www.kde.org/info/security/advisory-20051207-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-1.txt
81
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
82
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
83
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
84
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
85
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
86
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
87
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
88
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
89
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
90
reference_url http://www.novell.com/linux/security/advisories/2005_29_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_29_sr.html
91
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html
92
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
93
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
94
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html
95
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
96
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
97
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html
98
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html
99
reference_url http://www.redhat.com/support/errata/RHSA-2005-840.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-840.html
100
reference_url http://www.redhat.com/support/errata/RHSA-2005-867.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-867.html
101
reference_url http://www.redhat.com/support/errata/RHSA-2005-878.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-878.html
102
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
103
reference_url http://www.securityfocus.com/archive/1/418883/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/418883/100/0/threaded
104
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
105
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
106
reference_url http://www.securityfocus.com/bid/15721
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15721
107
reference_url http://www.trustix.org/errata/2005/0072/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0072/
108
reference_url http://www.ubuntulinux.org/usn/usn-227-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-227-1
109
reference_url http://www.vupen.com/english/advisories/2005/2787
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2787
110
reference_url http://www.vupen.com/english/advisories/2005/2789
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2789
111
reference_url http://www.vupen.com/english/advisories/2005/2790
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2790
112
reference_url http://www.vupen.com/english/advisories/2005/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2856
113
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
114
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617798
reference_id 1617798
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617798
115
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
reference_id 342281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
116
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
reference_id 342288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3193
reference_id CVE-2005-3193
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3193
133
reference_url https://security.gentoo.org/glsa/200512-08
reference_id GLSA-200512-08
reference_type
scores
url https://security.gentoo.org/glsa/200512-08
134
reference_url https://security.gentoo.org/glsa/200603-02
reference_id GLSA-200603-02
reference_type
scores
url https://security.gentoo.org/glsa/200603-02
135
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
136
reference_url https://access.redhat.com/errata/RHSA-2005:867
reference_id RHSA-2005:867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:867
137
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
138
reference_url https://access.redhat.com/errata/RHSA-2005:878
reference_id RHSA-2005:878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:878
139
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
140
reference_url https://usn.ubuntu.com/227-1/
reference_id USN-227-1
reference_type
scores
url https://usn.ubuntu.com/227-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-3193
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q1h-7uk2-nkhx
6
url VCID-5r8r-hhhf-e3as
vulnerability_id VCID-5r8r-hhhf-e3as
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0165
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82526
published_at 2026-04-01T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-02T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-04T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82551
published_at 2026-04-07T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.82577
published_at 2026-04-08T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-09T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82603
published_at 2026-04-11T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-12T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.8259
published_at 2026-04-13T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-16T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82627
published_at 2026-04-18T12:55:00Z
11
value 0.01757
scoring_system epss
scoring_elements 0.82631
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0165
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
3
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
4
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0165
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5r8r-hhhf-e3as
7
url VCID-65sa-tagy-3ybs
vulnerability_id VCID-65sa-tagy-3ybs
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76549
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76577
published_at 2026-04-04T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76558
published_at 2026-04-07T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.7659
published_at 2026-04-08T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76601
published_at 2026-04-09T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-11T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76607
published_at 2026-04-12T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-13T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76639
published_at 2026-04-16T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-18T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.76631
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495886
reference_id 495886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495886
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0799
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs
8
url VCID-6789-dh3f-rudp
vulnerability_id VCID-6789-dh3f-rudp
summary zxpdf in xpdf before 3.02-19 as packaged in Debian unstable and 3.02-12+squeeze1 as packaged in Debian squeeze deletes temporary files insecurely, which allows remote attackers to delete arbitrary files via a crafted .pdf.gz file name.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2902
reference_id
reference_type
scores
0
value 0.00587
scoring_system epss
scoring_elements 0.69024
published_at 2026-04-01T12:55:00Z
1
value 0.00587
scoring_system epss
scoring_elements 0.6904
published_at 2026-04-02T12:55:00Z
2
value 0.00587
scoring_system epss
scoring_elements 0.69061
published_at 2026-04-04T12:55:00Z
3
value 0.00587
scoring_system epss
scoring_elements 0.69041
published_at 2026-04-07T12:55:00Z
4
value 0.00587
scoring_system epss
scoring_elements 0.69091
published_at 2026-04-08T12:55:00Z
5
value 0.00587
scoring_system epss
scoring_elements 0.6911
published_at 2026-04-09T12:55:00Z
6
value 0.00587
scoring_system epss
scoring_elements 0.69133
published_at 2026-04-11T12:55:00Z
7
value 0.00587
scoring_system epss
scoring_elements 0.69118
published_at 2026-04-12T12:55:00Z
8
value 0.00587
scoring_system epss
scoring_elements 0.69089
published_at 2026-04-13T12:55:00Z
9
value 0.00587
scoring_system epss
scoring_elements 0.69128
published_at 2026-04-16T12:55:00Z
10
value 0.00587
scoring_system epss
scoring_elements 0.69138
published_at 2026-04-18T12:55:00Z
11
value 0.00587
scoring_system epss
scoring_elements 0.69117
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2902
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2902
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635849
reference_id 635849
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635849
fixed_packages
0
url pkg:deb/debian/xpdf@3.03-10
purl pkg:deb/debian/xpdf@3.03-10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.03-10
aliases CVE-2011-2902
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6789-dh3f-rudp
9
url VCID-68rw-a4ah-5khm
vulnerability_id VCID-68rw-a4ah-5khm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
reference_id
reference_type
scores
0
value 0.07101
scoring_system epss
scoring_elements 0.91487
published_at 2026-04-01T12:55:00Z
1
value 0.07101
scoring_system epss
scoring_elements 0.91493
published_at 2026-04-02T12:55:00Z
2
value 0.07101
scoring_system epss
scoring_elements 0.915
published_at 2026-04-04T12:55:00Z
3
value 0.07101
scoring_system epss
scoring_elements 0.91508
published_at 2026-04-07T12:55:00Z
4
value 0.07101
scoring_system epss
scoring_elements 0.91521
published_at 2026-04-08T12:55:00Z
5
value 0.07101
scoring_system epss
scoring_elements 0.91527
published_at 2026-04-09T12:55:00Z
6
value 0.07101
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-11T12:55:00Z
7
value 0.07101
scoring_system epss
scoring_elements 0.91533
published_at 2026-04-12T12:55:00Z
8
value 0.07101
scoring_system epss
scoring_elements 0.91531
published_at 2026-04-13T12:55:00Z
9
value 0.07101
scoring_system epss
scoring_elements 0.91554
published_at 2026-04-16T12:55:00Z
10
value 0.07101
scoring_system epss
scoring_elements 0.91549
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495896
reference_id 495896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495896
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1182
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm
10
url VCID-6dwz-8kx9-rugr
vulnerability_id VCID-6dwz-8kx9-rugr
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3603
reference_id
reference_type
scores
0
value 0.06276
scoring_system epss
scoring_elements 0.90877
published_at 2026-04-01T12:55:00Z
1
value 0.06276
scoring_system epss
scoring_elements 0.90882
published_at 2026-04-02T12:55:00Z
2
value 0.06276
scoring_system epss
scoring_elements 0.90892
published_at 2026-04-04T12:55:00Z
3
value 0.06276
scoring_system epss
scoring_elements 0.90902
published_at 2026-04-07T12:55:00Z
4
value 0.06276
scoring_system epss
scoring_elements 0.90913
published_at 2026-04-08T12:55:00Z
5
value 0.06276
scoring_system epss
scoring_elements 0.9092
published_at 2026-04-09T12:55:00Z
6
value 0.06276
scoring_system epss
scoring_elements 0.90928
published_at 2026-04-13T12:55:00Z
7
value 0.06276
scoring_system epss
scoring_elements 0.90929
published_at 2026-04-12T12:55:00Z
8
value 0.06276
scoring_system epss
scoring_elements 0.90952
published_at 2026-04-16T12:55:00Z
9
value 0.06276
scoring_system epss
scoring_elements 0.9095
published_at 2026-04-18T12:55:00Z
10
value 0.06276
scoring_system epss
scoring_elements 0.90951
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526915
reference_id 526915
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526915
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
8
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
9
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3603
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwz-8kx9-rugr
11
url VCID-6wa8-zfbz-hqcg
vulnerability_id VCID-6wa8-zfbz-hqcg
summary
Multiple vulnerabilities in Xpdf could result in execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4035.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4035.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4035
reference_id
reference_type
scores
0
value 0.0245
scoring_system epss
scoring_elements 0.8513
published_at 2026-04-01T12:55:00Z
1
value 0.0245
scoring_system epss
scoring_elements 0.85142
published_at 2026-04-02T12:55:00Z
2
value 0.0245
scoring_system epss
scoring_elements 0.85159
published_at 2026-04-04T12:55:00Z
3
value 0.0245
scoring_system epss
scoring_elements 0.85161
published_at 2026-04-07T12:55:00Z
4
value 0.0245
scoring_system epss
scoring_elements 0.85183
published_at 2026-04-08T12:55:00Z
5
value 0.0245
scoring_system epss
scoring_elements 0.85191
published_at 2026-04-09T12:55:00Z
6
value 0.0245
scoring_system epss
scoring_elements 0.85206
published_at 2026-04-11T12:55:00Z
7
value 0.0245
scoring_system epss
scoring_elements 0.85203
published_at 2026-04-12T12:55:00Z
8
value 0.0245
scoring_system epss
scoring_elements 0.852
published_at 2026-04-13T12:55:00Z
9
value 0.0245
scoring_system epss
scoring_elements 0.85221
published_at 2026-04-21T12:55:00Z
10
value 0.0245
scoring_system epss
scoring_elements 0.85223
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4035
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=541614
reference_id 541614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=541614
4
reference_url https://security.gentoo.org/glsa/201402-17
reference_id GLSA-201402-17
reference_type
scores
url https://security.gentoo.org/glsa/201402-17
5
reference_url https://access.redhat.com/errata/RHSA-2009:1680
reference_id RHSA-2009:1680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1680
6
reference_url https://access.redhat.com/errata/RHSA-2009:1681
reference_id RHSA-2009:1681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1681
7
reference_url https://access.redhat.com/errata/RHSA-2009:1682
reference_id RHSA-2009:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1682
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2009-4035
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wa8-zfbz-hqcg
12
url VCID-8uds-zs9k-47en
vulnerability_id VCID-8uds-zs9k-47en
summary
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
    Poppler potentially resulting in the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
2
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
4
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
5
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
6
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
7
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2005-868.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-868.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3191
reference_id
reference_type
scores
0
value 0.03031
scoring_system epss
scoring_elements 0.86675
published_at 2026-04-18T12:55:00Z
1
value 0.03031
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-01T12:55:00Z
2
value 0.03031
scoring_system epss
scoring_elements 0.86603
published_at 2026-04-02T12:55:00Z
3
value 0.03031
scoring_system epss
scoring_elements 0.86622
published_at 2026-04-07T12:55:00Z
4
value 0.03031
scoring_system epss
scoring_elements 0.86641
published_at 2026-04-08T12:55:00Z
5
value 0.03031
scoring_system epss
scoring_elements 0.86651
published_at 2026-04-09T12:55:00Z
6
value 0.03031
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-11T12:55:00Z
7
value 0.03031
scoring_system epss
scoring_elements 0.86662
published_at 2026-04-12T12:55:00Z
8
value 0.03031
scoring_system epss
scoring_elements 0.86655
published_at 2026-04-13T12:55:00Z
9
value 0.03031
scoring_system epss
scoring_elements 0.86668
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3191
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
12
reference_url http://secunia.com/advisories/17897
reference_id
reference_type
scores
url http://secunia.com/advisories/17897
13
reference_url http://secunia.com/advisories/17908
reference_id
reference_type
scores
url http://secunia.com/advisories/17908
14
reference_url http://secunia.com/advisories/17912
reference_id
reference_type
scores
url http://secunia.com/advisories/17912
15
reference_url http://secunia.com/advisories/17916
reference_id
reference_type
scores
url http://secunia.com/advisories/17916
16
reference_url http://secunia.com/advisories/17920
reference_id
reference_type
scores
url http://secunia.com/advisories/17920
17
reference_url http://secunia.com/advisories/17921
reference_id
reference_type
scores
url http://secunia.com/advisories/17921
18
reference_url http://secunia.com/advisories/17926
reference_id
reference_type
scores
url http://secunia.com/advisories/17926
19
reference_url http://secunia.com/advisories/17929
reference_id
reference_type
scores
url http://secunia.com/advisories/17929
20
reference_url http://secunia.com/advisories/17940
reference_id
reference_type
scores
url http://secunia.com/advisories/17940
21
reference_url http://secunia.com/advisories/17955
reference_id
reference_type
scores
url http://secunia.com/advisories/17955
22
reference_url http://secunia.com/advisories/17976
reference_id
reference_type
scores
url http://secunia.com/advisories/17976
23
reference_url http://secunia.com/advisories/18009
reference_id
reference_type
scores
url http://secunia.com/advisories/18009
24
reference_url http://secunia.com/advisories/18055
reference_id
reference_type
scores
url http://secunia.com/advisories/18055
25
reference_url http://secunia.com/advisories/18061
reference_id
reference_type
scores
url http://secunia.com/advisories/18061
26
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
27
reference_url http://secunia.com/advisories/18189
reference_id
reference_type
scores
url http://secunia.com/advisories/18189
28
reference_url http://secunia.com/advisories/18191
reference_id
reference_type
scores
url http://secunia.com/advisories/18191
29
reference_url http://secunia.com/advisories/18192
reference_id
reference_type
scores
url http://secunia.com/advisories/18192
30
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
31
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
32
reference_url http://secunia.com/advisories/18336
reference_id
reference_type
scores
url http://secunia.com/advisories/18336
33
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
34
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
35
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
36
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
37
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
38
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
39
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
40
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
41
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
42
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
43
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
44
reference_url http://secunia.com/advisories/18503
reference_id
reference_type
scores
url http://secunia.com/advisories/18503
45
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
46
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
47
reference_url http://secunia.com/advisories/18549
reference_id
reference_type
scores
url http://secunia.com/advisories/18549
48
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
49
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
50
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
51
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
52
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
53
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
54
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
55
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
56
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
57
reference_url http://secunia.com/advisories/19797
reference_id
reference_type
scores
url http://secunia.com/advisories/19797
58
reference_url http://secunia.com/advisories/19798
reference_id
reference_type
scores
url http://secunia.com/advisories/19798
59
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
60
reference_url http://secunia.com/advisories/26413
reference_id
reference_type
scores
url http://secunia.com/advisories/26413
61
reference_url http://securityreason.com/securityalert/233
reference_id
reference_type
scores
url http://securityreason.com/securityalert/233
62
reference_url http://securityreason.com/securityalert/234
reference_id
reference_type
scores
url http://securityreason.com/securityalert/234
63
reference_url http://securitytracker.com/id?1015309
reference_id
reference_type
scores
url http://securitytracker.com/id?1015309
64
reference_url http://securitytracker.com/id?1015324
reference_id
reference_type
scores
url http://securitytracker.com/id?1015324
65
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23443
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23443
66
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23444
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23444
67
reference_url https://issues.rpath.com/browse/RPL-1609
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1609
68
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
69
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
70
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
71
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
72
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
73
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
74
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
75
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
76
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
77
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
78
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
79
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
80
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
81
reference_url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
82
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
83
reference_url http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities
84
reference_url http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities
85
reference_url http://www.kde.org/info/security/advisory-20051207-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-1.txt
86
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
87
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
88
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
89
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
90
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
91
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
92
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
93
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
94
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
95
reference_url http://www.novell.com/linux/security/advisories/2005_29_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_29_sr.html
96
reference_url http://www.novell.com/linux/security/advisories/2006_02_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_02_sr.html
97
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
98
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
99
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
100
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
101
reference_url http://www.redhat.com/support/errata/RHSA-2005-840.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-840.html
102
reference_url http://www.redhat.com/support/errata/RHSA-2005-867.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-867.html
103
reference_url http://www.redhat.com/support/errata/RHSA-2005-878.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-878.html
104
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
105
reference_url http://www.securityfocus.com/archive/1/418883/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/418883/100/0/threaded
106
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
107
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
108
reference_url http://www.securityfocus.com/bid/15726
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15726
109
reference_url http://www.securityfocus.com/bid/15727
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15727
110
reference_url http://www.trustix.org/errata/2005/0072/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0072/
111
reference_url http://www.ubuntulinux.org/usn/usn-227-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-227-1
112
reference_url http://www.vupen.com/english/advisories/2005/2786
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2786
113
reference_url http://www.vupen.com/english/advisories/2005/2787
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2787
114
reference_url http://www.vupen.com/english/advisories/2005/2788
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2788
115
reference_url http://www.vupen.com/english/advisories/2005/2789
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2789
116
reference_url http://www.vupen.com/english/advisories/2005/2790
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2790
117
reference_url http://www.vupen.com/english/advisories/2005/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2856
118
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
119
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617796
reference_id 1617796
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617796
120
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
reference_id 342281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
121
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
reference_id 342288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3191
reference_id CVE-2005-3191
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3191
138
reference_url https://security.gentoo.org/glsa/200512-08
reference_id GLSA-200512-08
reference_type
scores
url https://security.gentoo.org/glsa/200512-08
139
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
140
reference_url https://access.redhat.com/errata/RHSA-2005:867
reference_id RHSA-2005:867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:867
141
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
142
reference_url https://access.redhat.com/errata/RHSA-2005:878
reference_id RHSA-2005:878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:878
143
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
144
reference_url https://usn.ubuntu.com/227-1/
reference_id USN-227-1
reference_type
scores
url https://usn.ubuntu.com/227-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-3191
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uds-zs9k-47en
13
url VCID-bkr4-sab1-5ka2
vulnerability_id VCID-bkr4-sab1-5ka2
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
4
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0177.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0177.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3627
reference_id
reference_type
scores
0
value 0.04327
scoring_system epss
scoring_elements 0.88925
published_at 2026-04-21T12:55:00Z
1
value 0.04327
scoring_system epss
scoring_elements 0.88863
published_at 2026-04-01T12:55:00Z
2
value 0.04327
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-02T12:55:00Z
3
value 0.04327
scoring_system epss
scoring_elements 0.88887
published_at 2026-04-04T12:55:00Z
4
value 0.04327
scoring_system epss
scoring_elements 0.88888
published_at 2026-04-07T12:55:00Z
5
value 0.04327
scoring_system epss
scoring_elements 0.88906
published_at 2026-04-08T12:55:00Z
6
value 0.04327
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-09T12:55:00Z
7
value 0.04327
scoring_system epss
scoring_elements 0.88923
published_at 2026-04-11T12:55:00Z
8
value 0.04327
scoring_system epss
scoring_elements 0.88918
published_at 2026-04-13T12:55:00Z
9
value 0.04327
scoring_system epss
scoring_elements 0.88931
published_at 2026-04-16T12:55:00Z
10
value 0.04327
scoring_system epss
scoring_elements 0.88929
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3627
8
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627
10
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
11
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
12
reference_url http://secunia.com/advisories/18312
reference_id
reference_type
scores
url http://secunia.com/advisories/18312
13
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
14
reference_url http://secunia.com/advisories/18329
reference_id
reference_type
scores
url http://secunia.com/advisories/18329
15
reference_url http://secunia.com/advisories/18332
reference_id
reference_type
scores
url http://secunia.com/advisories/18332
16
reference_url http://secunia.com/advisories/18334
reference_id
reference_type
scores
url http://secunia.com/advisories/18334
17
reference_url http://secunia.com/advisories/18335
reference_id
reference_type
scores
url http://secunia.com/advisories/18335
18
reference_url http://secunia.com/advisories/18338
reference_id
reference_type
scores
url http://secunia.com/advisories/18338
19
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
20
reference_url http://secunia.com/advisories/18373
reference_id
reference_type
scores
url http://secunia.com/advisories/18373
21
reference_url http://secunia.com/advisories/18375
reference_id
reference_type
scores
url http://secunia.com/advisories/18375
22
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
23
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
24
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
25
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
26
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
27
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
28
reference_url http://secunia.com/advisories/18414
reference_id
reference_type
scores
url http://secunia.com/advisories/18414
29
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
30
reference_url http://secunia.com/advisories/18423
reference_id
reference_type
scores
url http://secunia.com/advisories/18423
31
reference_url http://secunia.com/advisories/18425
reference_id
reference_type
scores
url http://secunia.com/advisories/18425
32
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
33
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
34
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
35
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
36
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
37
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
38
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
39
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
40
reference_url http://secunia.com/advisories/18642
reference_id
reference_type
scores
url http://secunia.com/advisories/18642
41
reference_url http://secunia.com/advisories/18644
reference_id
reference_type
scores
url http://secunia.com/advisories/18644
42
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
43
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
44
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
45
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
46
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
47
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
48
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
49
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
50
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24024
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24024
51
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24025
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24025
52
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
53
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
54
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200
55
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
56
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
57
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
58
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
59
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
60
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
61
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
62
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
63
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
64
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
65
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
66
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
67
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
68
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
69
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
70
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
71
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
72
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
74
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
75
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
76
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
77
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
78
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
79
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
80
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
81
reference_url http://www.redhat.com/support/errata/RHSA-2006-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0163.html
82
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
83
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
84
reference_url http://www.securityfocus.com/bid/16143
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16143
85
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
86
reference_url http://www.vupen.com/english/advisories/2006/0047
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0047
87
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
88
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617829
reference_id 1617829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617829
89
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
reference_id 346076
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3627
reference_id CVE-2005-3627
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3627
92
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
93
reference_url https://security.gentoo.org/glsa/200601-17
reference_id GLSA-200601-17
reference_type
scores
url https://security.gentoo.org/glsa/200601-17
94
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
95
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
96
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
97
reference_url https://access.redhat.com/errata/RHSA-2006:0163
reference_id RHSA-2006:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0163
98
reference_url https://access.redhat.com/errata/RHSA-2006:0177
reference_id RHSA-2006:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0177
99
reference_url https://usn.ubuntu.com/236-1/
reference_id USN-236-1
reference_type
scores
url https://usn.ubuntu.com/236-1/
100
reference_url https://usn.ubuntu.com/236-2/
reference_id USN-236-2
reference_type
scores
url https://usn.ubuntu.com/236-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-3627
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkr4-sab1-5ka2
14
url VCID-byr3-7wgc-jye9
vulnerability_id VCID-byr3-7wgc-jye9
summary
Multiple vulnerabilities have been discovered in T1Lib, the worst
    of which could lead to remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1554.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1554.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1554
reference_id
reference_type
scores
0
value 0.06576
scoring_system epss
scoring_elements 0.91179
published_at 2026-04-21T12:55:00Z
1
value 0.06576
scoring_system epss
scoring_elements 0.91102
published_at 2026-04-01T12:55:00Z
2
value 0.06576
scoring_system epss
scoring_elements 0.91108
published_at 2026-04-02T12:55:00Z
3
value 0.06576
scoring_system epss
scoring_elements 0.91116
published_at 2026-04-04T12:55:00Z
4
value 0.06576
scoring_system epss
scoring_elements 0.91124
published_at 2026-04-07T12:55:00Z
5
value 0.06576
scoring_system epss
scoring_elements 0.91137
published_at 2026-04-08T12:55:00Z
6
value 0.06576
scoring_system epss
scoring_elements 0.91143
published_at 2026-04-09T12:55:00Z
7
value 0.06576
scoring_system epss
scoring_elements 0.9115
published_at 2026-04-11T12:55:00Z
8
value 0.06576
scoring_system epss
scoring_elements 0.91152
published_at 2026-04-12T12:55:00Z
9
value 0.06576
scoring_system epss
scoring_elements 0.91151
published_at 2026-04-13T12:55:00Z
10
value 0.06576
scoring_system epss
scoring_elements 0.91176
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1554
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554
4
reference_url http://secunia.com/advisories/43823
reference_id
reference_type
scores
url http://secunia.com/advisories/43823
5
reference_url http://secunia.com/advisories/48985
reference_id
reference_type
scores
url http://secunia.com/advisories/48985
6
reference_url http://securityreason.com/securityalert/8171
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8171
7
reference_url http://securitytracker.com/id?1025266
reference_id
reference_type
scores
url http://securitytracker.com/id?1025266
8
reference_url http://www.foolabs.com/xpdf/download.html
reference_id
reference_type
scores
url http://www.foolabs.com/xpdf/download.html
9
reference_url http://www.kb.cert.org/vuls/id/376500
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/376500
10
reference_url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
12
reference_url http://www.securityfocus.com/archive/1/517205/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517205/100/0/threaded
13
reference_url http://www.toucan-system.com/advisories/tssa-2011-01.txt
reference_id
reference_type
scores
url http://www.toucan-system.com/advisories/tssa-2011-01.txt
14
reference_url http://www.vupen.com/english/advisories/2011/0728
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0728
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692856
reference_id 692856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692856
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1554
reference_id CVE-2011-1554
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1554
81
reference_url https://security.gentoo.org/glsa/201701-57
reference_id GLSA-201701-57
reference_type
scores
url https://security.gentoo.org/glsa/201701-57
82
reference_url https://access.redhat.com/errata/RHSA-2012:0062
reference_id RHSA-2012:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0062
83
reference_url https://access.redhat.com/errata/RHSA-2012:0137
reference_id RHSA-2012:0137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0137
84
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
85
reference_url https://usn.ubuntu.com/1335-1/
reference_id USN-1335-1
reference_type
scores
url https://usn.ubuntu.com/1335-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2011-1554
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byr3-7wgc-jye9
15
url VCID-ctb2-8h4y-vybd
vulnerability_id VCID-ctb2-8h4y-vybd
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
reference_id
reference_type
scores
0
value 0.0519
scoring_system epss
scoring_elements 0.8988
published_at 2026-04-01T12:55:00Z
1
value 0.0519
scoring_system epss
scoring_elements 0.89883
published_at 2026-04-02T12:55:00Z
2
value 0.0519
scoring_system epss
scoring_elements 0.89895
published_at 2026-04-04T12:55:00Z
3
value 0.0519
scoring_system epss
scoring_elements 0.899
published_at 2026-04-07T12:55:00Z
4
value 0.0519
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-08T12:55:00Z
5
value 0.0519
scoring_system epss
scoring_elements 0.89922
published_at 2026-04-09T12:55:00Z
6
value 0.0519
scoring_system epss
scoring_elements 0.89929
published_at 2026-04-11T12:55:00Z
7
value 0.0519
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-12T12:55:00Z
8
value 0.0519
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-13T12:55:00Z
9
value 0.0519
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-16T12:55:00Z
10
value 0.0519
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-18T12:55:00Z
11
value 0.0519
scoring_system epss
scoring_elements 0.89931
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490625
reference_id 490625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490625
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0166
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd
16
url VCID-ctdw-25y5-8kdm
vulnerability_id VCID-ctdw-25y5-8kdm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
reference_id
reference_type
scores
0
value 0.09017
scoring_system epss
scoring_elements 0.92595
published_at 2026-04-01T12:55:00Z
1
value 0.09017
scoring_system epss
scoring_elements 0.92601
published_at 2026-04-02T12:55:00Z
2
value 0.09017
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-04T12:55:00Z
3
value 0.09017
scoring_system epss
scoring_elements 0.92608
published_at 2026-04-07T12:55:00Z
4
value 0.09017
scoring_system epss
scoring_elements 0.92619
published_at 2026-04-08T12:55:00Z
5
value 0.09017
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-09T12:55:00Z
6
value 0.09017
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-13T12:55:00Z
7
value 0.09017
scoring_system epss
scoring_elements 0.92642
published_at 2026-04-16T12:55:00Z
8
value 0.09017
scoring_system epss
scoring_elements 0.92641
published_at 2026-04-18T12:55:00Z
9
value 0.09017
scoring_system epss
scoring_elements 0.92645
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
6
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
7
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
8
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
9
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
10
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
11
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
12
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
13
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0195
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm
17
url VCID-dgb8-nes9-8fb7
vulnerability_id VCID-dgb8-nes9-8fb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
reference_id
reference_type
scores
0
value 0.02384
scoring_system epss
scoring_elements 0.84926
published_at 2026-04-01T12:55:00Z
1
value 0.02384
scoring_system epss
scoring_elements 0.8494
published_at 2026-04-02T12:55:00Z
2
value 0.02384
scoring_system epss
scoring_elements 0.84959
published_at 2026-04-04T12:55:00Z
3
value 0.02384
scoring_system epss
scoring_elements 0.84963
published_at 2026-04-07T12:55:00Z
4
value 0.02384
scoring_system epss
scoring_elements 0.84986
published_at 2026-04-08T12:55:00Z
5
value 0.02384
scoring_system epss
scoring_elements 0.84993
published_at 2026-04-09T12:55:00Z
6
value 0.02384
scoring_system epss
scoring_elements 0.85008
published_at 2026-04-11T12:55:00Z
7
value 0.02384
scoring_system epss
scoring_elements 0.85006
published_at 2026-04-12T12:55:00Z
8
value 0.02384
scoring_system epss
scoring_elements 0.85003
published_at 2026-04-13T12:55:00Z
9
value 0.02384
scoring_system epss
scoring_elements 0.85024
published_at 2026-04-16T12:55:00Z
10
value 0.02384
scoring_system epss
scoring_elements 0.85026
published_at 2026-04-18T12:55:00Z
11
value 0.02384
scoring_system epss
scoring_elements 0.85023
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490614
reference_id 490614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490614
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7
18
url VCID-dn3b-smm9-63eb
vulnerability_id VCID-dn3b-smm9-63eb
summary
Poppler does not handle fonts inside PDF files safely, allowing for
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1693.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1693
reference_id
reference_type
scores
0
value 0.07598
scoring_system epss
scoring_elements 0.9181
published_at 2026-04-01T12:55:00Z
1
value 0.07598
scoring_system epss
scoring_elements 0.91818
published_at 2026-04-02T12:55:00Z
2
value 0.07598
scoring_system epss
scoring_elements 0.91824
published_at 2026-04-04T12:55:00Z
3
value 0.07598
scoring_system epss
scoring_elements 0.91832
published_at 2026-04-07T12:55:00Z
4
value 0.07598
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-08T12:55:00Z
5
value 0.07598
scoring_system epss
scoring_elements 0.9185
published_at 2026-04-09T12:55:00Z
6
value 0.07598
scoring_system epss
scoring_elements 0.91854
published_at 2026-04-11T12:55:00Z
7
value 0.07598
scoring_system epss
scoring_elements 0.91855
published_at 2026-04-12T12:55:00Z
8
value 0.07598
scoring_system epss
scoring_elements 0.91851
published_at 2026-04-13T12:55:00Z
9
value 0.07598
scoring_system epss
scoring_elements 0.91871
published_at 2026-04-16T12:55:00Z
10
value 0.07598
scoring_system epss
scoring_elements 0.91867
published_at 2026-04-18T12:55:00Z
11
value 0.07598
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=441722
reference_id 441722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=441722
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476842
reference_id 476842
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476842
5
reference_url https://security.gentoo.org/glsa/200804-18
reference_id GLSA-200804-18
reference_type
scores
url https://security.gentoo.org/glsa/200804-18
6
reference_url https://access.redhat.com/errata/RHSA-2008:0238
reference_id RHSA-2008:0238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0238
7
reference_url https://access.redhat.com/errata/RHSA-2008:0239
reference_id RHSA-2008:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0239
8
reference_url https://access.redhat.com/errata/RHSA-2008:0240
reference_id RHSA-2008:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0240
9
reference_url https://access.redhat.com/errata/RHSA-2008:0262
reference_id RHSA-2008:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0262
10
reference_url https://usn.ubuntu.com/603-1/
reference_id USN-603-1
reference_type
scores
url https://usn.ubuntu.com/603-1/
11
reference_url https://usn.ubuntu.com/603-2/
reference_id USN-603-2
reference_type
scores
url https://usn.ubuntu.com/603-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2008-1693
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn3b-smm9-63eb
19
url VCID-durs-kj4r-jbf2
vulnerability_id VCID-durs-kj4r-jbf2
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2097
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21881
published_at 2026-04-21T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21883
published_at 2026-04-01T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-02T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22098
published_at 2026-04-04T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21874
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21956
published_at 2026-04-08T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22011
published_at 2026-04-09T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22026
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21985
published_at 2026-04-12T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21927
published_at 2026-04-16T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21924
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097
4
reference_url http://secunia.com/advisories/17277
reference_id
reference_type
scores
url http://secunia.com/advisories/17277
5
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
6
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
7
reference_url http://secunia.com/advisories/21339
reference_id
reference_type
scores
url http://secunia.com/advisories/21339
8
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280
10
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
11
reference_url http://www.debian.org/security/2005/dsa-780
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-780
12
reference_url http://www.debian.org/security/2006/dsa-1136
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1136
13
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
14
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:138
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:138
15
reference_url http://www.novell.com/linux/security/advisories/2005_19_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_19_sr.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2005-670.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-670.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2005-671.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-671.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2005-706.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-706.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2005-708.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-708.html
20
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
21
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/14529
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14529
23
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617684
reference_id 1617684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617684
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462
reference_id 322462
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464
reference_id 324464
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2097
reference_id CVE-2005-2097
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2097
32
reference_url https://access.redhat.com/errata/RHSA-2005:670
reference_id RHSA-2005:670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:670
33
reference_url https://access.redhat.com/errata/RHSA-2005:671
reference_id RHSA-2005:671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:671
34
reference_url https://access.redhat.com/errata/RHSA-2005:706
reference_id RHSA-2005:706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:706
35
reference_url https://access.redhat.com/errata/RHSA-2005:708
reference_id RHSA-2005:708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:708
36
reference_url https://usn.ubuntu.com/163-1/
reference_id USN-163-1
reference_type
scores
url https://usn.ubuntu.com/163-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-2097
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-durs-kj4r-jbf2
20
url VCID-fct6-695j-t7bs
vulnerability_id VCID-fct6-695j-t7bs
summary
PDFKit and ImageKits are vulnerable to an integer overflow and a stack
    overflow allowing for the user-assisted execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3387
reference_id
reference_type
scores
0
value 0.08892
scoring_system epss
scoring_elements 0.92529
published_at 2026-04-01T12:55:00Z
1
value 0.08892
scoring_system epss
scoring_elements 0.92534
published_at 2026-04-02T12:55:00Z
2
value 0.08892
scoring_system epss
scoring_elements 0.92541
published_at 2026-04-04T12:55:00Z
3
value 0.08892
scoring_system epss
scoring_elements 0.92544
published_at 2026-04-07T12:55:00Z
4
value 0.08892
scoring_system epss
scoring_elements 0.92554
published_at 2026-04-08T12:55:00Z
5
value 0.08892
scoring_system epss
scoring_elements 0.92559
published_at 2026-04-09T12:55:00Z
6
value 0.08892
scoring_system epss
scoring_elements 0.92565
published_at 2026-04-13T12:55:00Z
7
value 0.08892
scoring_system epss
scoring_elements 0.92566
published_at 2026-04-12T12:55:00Z
8
value 0.08892
scoring_system epss
scoring_elements 0.92577
published_at 2026-04-16T12:55:00Z
9
value 0.08892
scoring_system epss
scoring_elements 0.92576
published_at 2026-04-18T12:55:00Z
10
value 0.08892
scoring_system epss
scoring_elements 0.92579
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3387
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=248194
reference_id 248194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=248194
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460
reference_id 435460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462
reference_id 435462
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462
6
reference_url https://security.gentoo.org/glsa/200709-12
reference_id GLSA-200709-12
reference_type
scores
url https://security.gentoo.org/glsa/200709-12
7
reference_url https://security.gentoo.org/glsa/200709-17
reference_id GLSA-200709-17
reference_type
scores
url https://security.gentoo.org/glsa/200709-17
8
reference_url https://security.gentoo.org/glsa/200710-08
reference_id GLSA-200710-08
reference_type
scores
url https://security.gentoo.org/glsa/200710-08
9
reference_url https://security.gentoo.org/glsa/200710-20
reference_id GLSA-200710-20
reference_type
scores
url https://security.gentoo.org/glsa/200710-20
10
reference_url https://access.redhat.com/errata/RHSA-2007:0720
reference_id RHSA-2007:0720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0720
11
reference_url https://access.redhat.com/errata/RHSA-2007:0729
reference_id RHSA-2007:0729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0729
12
reference_url https://access.redhat.com/errata/RHSA-2007:0730
reference_id RHSA-2007:0730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0730
13
reference_url https://access.redhat.com/errata/RHSA-2007:0731
reference_id RHSA-2007:0731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0731
14
reference_url https://access.redhat.com/errata/RHSA-2007:0732
reference_id RHSA-2007:0732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0732
15
reference_url https://access.redhat.com/errata/RHSA-2007:0735
reference_id RHSA-2007:0735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0735
16
reference_url https://usn.ubuntu.com/496-1/
reference_id USN-496-1
reference_type
scores
url https://usn.ubuntu.com/496-1/
17
reference_url https://usn.ubuntu.com/496-2/
reference_id USN-496-2
reference_type
scores
url https://usn.ubuntu.com/496-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-3387
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fct6-695j-t7bs
21
url VCID-gbm8-vcwy-u3g2
vulnerability_id VCID-gbm8-vcwy-u3g2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
reference_id
reference_type
scores
0
value 0.27841
scoring_system epss
scoring_elements 0.96426
published_at 2026-04-01T12:55:00Z
1
value 0.27841
scoring_system epss
scoring_elements 0.96433
published_at 2026-04-02T12:55:00Z
2
value 0.27841
scoring_system epss
scoring_elements 0.96437
published_at 2026-04-04T12:55:00Z
3
value 0.27841
scoring_system epss
scoring_elements 0.9644
published_at 2026-04-07T12:55:00Z
4
value 0.27841
scoring_system epss
scoring_elements 0.96449
published_at 2026-04-08T12:55:00Z
5
value 0.27841
scoring_system epss
scoring_elements 0.96452
published_at 2026-04-09T12:55:00Z
6
value 0.27841
scoring_system epss
scoring_elements 0.96456
published_at 2026-04-11T12:55:00Z
7
value 0.27841
scoring_system epss
scoring_elements 0.96457
published_at 2026-04-12T12:55:00Z
8
value 0.27841
scoring_system epss
scoring_elements 0.96459
published_at 2026-04-13T12:55:00Z
9
value 0.27841
scoring_system epss
scoring_elements 0.96466
published_at 2026-04-16T12:55:00Z
10
value 0.27841
scoring_system epss
scoring_elements 0.9647
published_at 2026-04-18T12:55:00Z
11
value 0.27841
scoring_system epss
scoring_elements 0.96473
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495889
reference_id 495889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495889
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1179
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2
22
url VCID-gc6w-tctk-nycd
vulnerability_id VCID-gc6w-tctk-nycd
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json
1
reference_url https://access.redhat.com/security/cve/cve-2010-4653
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2010-4653
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4653
reference_id
reference_type
scores
0
value 0.00782
scoring_system epss
scoring_elements 0.73766
published_at 2026-04-21T12:55:00Z
1
value 0.00782
scoring_system epss
scoring_elements 0.73775
published_at 2026-04-18T12:55:00Z
2
value 0.00782
scoring_system epss
scoring_elements 0.73677
published_at 2026-04-01T12:55:00Z
3
value 0.00782
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-02T12:55:00Z
4
value 0.00782
scoring_system epss
scoring_elements 0.73709
published_at 2026-04-04T12:55:00Z
5
value 0.00782
scoring_system epss
scoring_elements 0.73682
published_at 2026-04-07T12:55:00Z
6
value 0.00782
scoring_system epss
scoring_elements 0.73717
published_at 2026-04-08T12:55:00Z
7
value 0.00782
scoring_system epss
scoring_elements 0.73729
published_at 2026-04-09T12:55:00Z
8
value 0.00782
scoring_system epss
scoring_elements 0.73751
published_at 2026-04-11T12:55:00Z
9
value 0.00782
scoring_system epss
scoring_elements 0.73733
published_at 2026-04-12T12:55:00Z
10
value 0.00782
scoring_system epss
scoring_elements 0.73724
published_at 2026-04-13T12:55:00Z
11
value 0.00782
scoring_system epss
scoring_elements 0.73767
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4653
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653
5
reference_url http://security.gentoo.org/glsa/glsa-201310-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201310-03.xml
6
reference_url https://security-tracker.debian.org/tracker/CVE-2010-4653
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2010-4653
7
reference_url http://www.securityfocus.com/bid/45948
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45948
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672165
reference_id 672165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672165
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4653
reference_id CVE-2010-4653
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-4653
14
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2010-4653
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gc6w-tctk-nycd
23
url VCID-jvuz-2phs-87du
vulnerability_id VCID-jvuz-2phs-87du
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
reference_id
reference_type
scores
0
value 0.08831
scoring_system epss
scoring_elements 0.92498
published_at 2026-04-01T12:55:00Z
1
value 0.08831
scoring_system epss
scoring_elements 0.92504
published_at 2026-04-02T12:55:00Z
2
value 0.08831
scoring_system epss
scoring_elements 0.92512
published_at 2026-04-04T12:55:00Z
3
value 0.08831
scoring_system epss
scoring_elements 0.92514
published_at 2026-04-07T12:55:00Z
4
value 0.08831
scoring_system epss
scoring_elements 0.92526
published_at 2026-04-08T12:55:00Z
5
value 0.08831
scoring_system epss
scoring_elements 0.9253
published_at 2026-04-09T12:55:00Z
6
value 0.08831
scoring_system epss
scoring_elements 0.92537
published_at 2026-04-13T12:55:00Z
7
value 0.08831
scoring_system epss
scoring_elements 0.92538
published_at 2026-04-12T12:55:00Z
8
value 0.08831
scoring_system epss
scoring_elements 0.92547
published_at 2026-04-18T12:55:00Z
9
value 0.08831
scoring_system epss
scoring_elements 0.92549
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495892
reference_id 495892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495892
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1180
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du
24
url VCID-kgk7-hqby-wkez
vulnerability_id VCID-kgk7-hqby-wkez
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4352
reference_id
reference_type
scores
0
value 0.25469
scoring_system epss
scoring_elements 0.9618
published_at 2026-04-01T12:55:00Z
1
value 0.25469
scoring_system epss
scoring_elements 0.96188
published_at 2026-04-02T12:55:00Z
2
value 0.25469
scoring_system epss
scoring_elements 0.96196
published_at 2026-04-04T12:55:00Z
3
value 0.25469
scoring_system epss
scoring_elements 0.96199
published_at 2026-04-07T12:55:00Z
4
value 0.25469
scoring_system epss
scoring_elements 0.96209
published_at 2026-04-08T12:55:00Z
5
value 0.25469
scoring_system epss
scoring_elements 0.96212
published_at 2026-04-09T12:55:00Z
6
value 0.25469
scoring_system epss
scoring_elements 0.96217
published_at 2026-04-11T12:55:00Z
7
value 0.25469
scoring_system epss
scoring_elements 0.96216
published_at 2026-04-12T12:55:00Z
8
value 0.25469
scoring_system epss
scoring_elements 0.96218
published_at 2026-04-13T12:55:00Z
9
value 0.25469
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-16T12:55:00Z
10
value 0.25469
scoring_system epss
scoring_elements 0.96231
published_at 2026-04-18T12:55:00Z
11
value 0.25469
scoring_system epss
scoring_elements 0.96232
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4352
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345101
reference_id 345101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345101
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
10
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
11
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
12
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
13
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
14
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
15
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
16
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-4352
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgk7-hqby-wkez
25
url VCID-mg1z-d7y8-dfaj
vulnerability_id VCID-mg1z-d7y8-dfaj
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
4
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0177.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0177.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3624
reference_id
reference_type
scores
0
value 0.07357
scoring_system epss
scoring_elements 0.91726
published_at 2026-04-21T12:55:00Z
1
value 0.07357
scoring_system epss
scoring_elements 0.91668
published_at 2026-04-01T12:55:00Z
2
value 0.07357
scoring_system epss
scoring_elements 0.91676
published_at 2026-04-02T12:55:00Z
3
value 0.07357
scoring_system epss
scoring_elements 0.91682
published_at 2026-04-04T12:55:00Z
4
value 0.07357
scoring_system epss
scoring_elements 0.91691
published_at 2026-04-07T12:55:00Z
5
value 0.07357
scoring_system epss
scoring_elements 0.91703
published_at 2026-04-08T12:55:00Z
6
value 0.07357
scoring_system epss
scoring_elements 0.9171
published_at 2026-04-09T12:55:00Z
7
value 0.07357
scoring_system epss
scoring_elements 0.91713
published_at 2026-04-11T12:55:00Z
8
value 0.07357
scoring_system epss
scoring_elements 0.91716
published_at 2026-04-12T12:55:00Z
9
value 0.07357
scoring_system epss
scoring_elements 0.91712
published_at 2026-04-13T12:55:00Z
10
value 0.07357
scoring_system epss
scoring_elements 0.91732
published_at 2026-04-16T12:55:00Z
11
value 0.07357
scoring_system epss
scoring_elements 0.91725
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3624
8
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624
10
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
11
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
12
reference_url http://secunia.com/advisories/18312
reference_id
reference_type
scores
url http://secunia.com/advisories/18312
13
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
14
reference_url http://secunia.com/advisories/18329
reference_id
reference_type
scores
url http://secunia.com/advisories/18329
15
reference_url http://secunia.com/advisories/18332
reference_id
reference_type
scores
url http://secunia.com/advisories/18332
16
reference_url http://secunia.com/advisories/18334
reference_id
reference_type
scores
url http://secunia.com/advisories/18334
17
reference_url http://secunia.com/advisories/18338
reference_id
reference_type
scores
url http://secunia.com/advisories/18338
18
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
19
reference_url http://secunia.com/advisories/18373
reference_id
reference_type
scores
url http://secunia.com/advisories/18373
20
reference_url http://secunia.com/advisories/18375
reference_id
reference_type
scores
url http://secunia.com/advisories/18375
21
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
22
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
23
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
24
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
25
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
26
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
27
reference_url http://secunia.com/advisories/18414
reference_id
reference_type
scores
url http://secunia.com/advisories/18414
28
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
29
reference_url http://secunia.com/advisories/18423
reference_id
reference_type
scores
url http://secunia.com/advisories/18423
30
reference_url http://secunia.com/advisories/18425
reference_id
reference_type
scores
url http://secunia.com/advisories/18425
31
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
32
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
33
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
34
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
35
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
36
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
37
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
38
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
39
reference_url http://secunia.com/advisories/18642
reference_id
reference_type
scores
url http://secunia.com/advisories/18642
40
reference_url http://secunia.com/advisories/18644
reference_id
reference_type
scores
url http://secunia.com/advisories/18644
41
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
42
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
43
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
44
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
45
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
46
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
47
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
48
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
49
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24022
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24022
50
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
51
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
52
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
53
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
54
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
55
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
56
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
57
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
58
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
59
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
60
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
61
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
62
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
63
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
64
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
65
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
66
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
67
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
68
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
69
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
70
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
71
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
72
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
74
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
75
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
76
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
77
reference_url http://www.redhat.com/support/errata/RHSA-2006-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0163.html
78
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
79
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
80
reference_url http://www.securityfocus.com/bid/16143
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16143
81
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
82
reference_url http://www.vupen.com/english/advisories/2006/0047
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0047
83
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
84
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617826
reference_id 1617826
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617826
85
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
reference_id 346076
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_id cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3624
reference_id CVE-2005-3624
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-3624
214
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
215
reference_url https://security.gentoo.org/glsa/200601-17
reference_id GLSA-200601-17
reference_type
scores
url https://security.gentoo.org/glsa/200601-17
216
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
217
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
218
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
219
reference_url https://access.redhat.com/errata/RHSA-2006:0163
reference_id RHSA-2006:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0163
220
reference_url https://access.redhat.com/errata/RHSA-2006:0177
reference_id RHSA-2006:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0177
221
reference_url https://usn.ubuntu.com/236-1/
reference_id USN-236-1
reference_type
scores
url https://usn.ubuntu.com/236-1/
222
reference_url https://usn.ubuntu.com/236-2/
reference_id USN-236-2
reference_type
scores
url https://usn.ubuntu.com/236-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-3624
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mg1z-d7y8-dfaj
26
url VCID-mq43-5wd8-ayan
vulnerability_id VCID-mq43-5wd8-ayan
summary xpdf infinite loop DoS
references
0
reference_url http://docs.info.apple.com/article.html?artnum=305214
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=305214
1
reference_url http://projects.info-pull.com/moab/MOAB-06-01-2007.html
reference_id
reference_type
scores
url http://projects.info-pull.com/moab/MOAB-06-01-2007.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0104.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0104.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0104
reference_id
reference_type
scores
0
value 0.19012
scoring_system epss
scoring_elements 0.95338
published_at 2026-04-21T12:55:00Z
1
value 0.19012
scoring_system epss
scoring_elements 0.95284
published_at 2026-04-01T12:55:00Z
2
value 0.19012
scoring_system epss
scoring_elements 0.95296
published_at 2026-04-02T12:55:00Z
3
value 0.19012
scoring_system epss
scoring_elements 0.95301
published_at 2026-04-04T12:55:00Z
4
value 0.19012
scoring_system epss
scoring_elements 0.95307
published_at 2026-04-07T12:55:00Z
5
value 0.19012
scoring_system epss
scoring_elements 0.95314
published_at 2026-04-08T12:55:00Z
6
value 0.19012
scoring_system epss
scoring_elements 0.95317
published_at 2026-04-09T12:55:00Z
7
value 0.19012
scoring_system epss
scoring_elements 0.95322
published_at 2026-04-12T12:55:00Z
8
value 0.19012
scoring_system epss
scoring_elements 0.95324
published_at 2026-04-13T12:55:00Z
9
value 0.19012
scoring_system epss
scoring_elements 0.95331
published_at 2026-04-16T12:55:00Z
10
value 0.19012
scoring_system epss
scoring_elements 0.95335
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0104
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104
5
reference_url http://secunia.com/advisories/23791
reference_id
reference_type
scores
url http://secunia.com/advisories/23791
6
reference_url http://secunia.com/advisories/23799
reference_id
reference_type
scores
url http://secunia.com/advisories/23799
7
reference_url http://secunia.com/advisories/23808
reference_id
reference_type
scores
url http://secunia.com/advisories/23808
8
reference_url http://secunia.com/advisories/23813
reference_id
reference_type
scores
url http://secunia.com/advisories/23813
9
reference_url http://secunia.com/advisories/23815
reference_id
reference_type
scores
url http://secunia.com/advisories/23815
10
reference_url http://secunia.com/advisories/23839
reference_id
reference_type
scores
url http://secunia.com/advisories/23839
11
reference_url http://secunia.com/advisories/23844
reference_id
reference_type
scores
url http://secunia.com/advisories/23844
12
reference_url http://secunia.com/advisories/23876
reference_id
reference_type
scores
url http://secunia.com/advisories/23876
13
reference_url http://secunia.com/advisories/24204
reference_id
reference_type
scores
url http://secunia.com/advisories/24204
14
reference_url http://secunia.com/advisories/24479
reference_id
reference_type
scores
url http://secunia.com/advisories/24479
15
reference_url http://securitytracker.com/id?1017514
reference_id
reference_type
scores
url http://securitytracker.com/id?1017514
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31364
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31364
17
reference_url https://issues.rpath.com/browse/RPL-964
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-964
18
reference_url http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html
reference_id
reference_type
scores
url http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html
19
reference_url http://www.kde.org/info/security/advisory-20070115-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20070115-1.txt
20
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:018
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:018
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:019
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:019
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:020
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:020
23
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:021
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:021
24
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:022
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:022
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:024
26
reference_url http://www.novell.com/linux/security/advisories/2007_3_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_3_sr.html
27
reference_url http://www.securityfocus.com/archive/1/457055/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/457055/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/21910
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21910
29
reference_url http://www.securitytracker.com/id?1017749
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017749
30
reference_url http://www.ubuntu.com/usn/usn-410-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-410-1
31
reference_url http://www.ubuntu.com/usn/usn-410-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-410-2
32
reference_url http://www.us-cert.gov/cas/techalerts/TA07-072A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-072A.html
33
reference_url http://www.vupen.com/english/advisories/2007/0203
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0203
34
reference_url http://www.vupen.com/english/advisories/2007/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0212
35
reference_url http://www.vupen.com/english/advisories/2007/0244
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0244
36
reference_url http://www.vupen.com/english/advisories/2007/0930
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0930
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852
reference_id 406852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=428126
reference_id 428126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=428126
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0104
reference_id CVE-2007-0104
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0104
57
reference_url https://usn.ubuntu.com/410-1/
reference_id USN-410-1
reference_type
scores
url https://usn.ubuntu.com/410-1/
58
reference_url https://usn.ubuntu.com/410-2/
reference_id USN-410-2
reference_type
scores
url https://usn.ubuntu.com/410-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-0104
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mq43-5wd8-ayan
27
url VCID-neqs-cg1p-7bb7
vulnerability_id VCID-neqs-cg1p-7bb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3702
reference_id
reference_type
scores
0
value 0.02916
scoring_system epss
scoring_elements 0.86395
published_at 2026-04-21T12:55:00Z
1
value 0.02916
scoring_system epss
scoring_elements 0.86316
published_at 2026-04-01T12:55:00Z
2
value 0.02916
scoring_system epss
scoring_elements 0.86326
published_at 2026-04-02T12:55:00Z
3
value 0.02916
scoring_system epss
scoring_elements 0.86345
published_at 2026-04-04T12:55:00Z
4
value 0.02916
scoring_system epss
scoring_elements 0.86346
published_at 2026-04-07T12:55:00Z
5
value 0.02916
scoring_system epss
scoring_elements 0.86364
published_at 2026-04-08T12:55:00Z
6
value 0.02916
scoring_system epss
scoring_elements 0.86374
published_at 2026-04-09T12:55:00Z
7
value 0.02916
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-11T12:55:00Z
8
value 0.02916
scoring_system epss
scoring_elements 0.86385
published_at 2026-04-12T12:55:00Z
9
value 0.02916
scoring_system epss
scoring_elements 0.8638
published_at 2026-04-13T12:55:00Z
10
value 0.02916
scoring_system epss
scoring_elements 0.86397
published_at 2026-04-16T12:55:00Z
11
value 0.02916
scoring_system epss
scoring_elements 0.86402
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3702
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
15
reference_url http://secunia.com/advisories/42141
reference_id
reference_type
scores
url http://secunia.com/advisories/42141
16
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
17
reference_url http://secunia.com/advisories/42397
reference_id
reference_type
scores
url http://secunia.com/advisories/42397
18
reference_url http://secunia.com/advisories/42691
reference_id
reference_type
scores
url http://secunia.com/advisories/42691
19
reference_url http://secunia.com/advisories/43079
reference_id
reference_type
scores
url http://secunia.com/advisories/43079
20
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
21
reference_url http://www.debian.org/security/2010/dsa-2119
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2119
22
reference_url http://www.debian.org/security/2010/dsa-2135
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2135
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
28
reference_url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
29
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
30
reference_url http://www.redhat.com/support/errata/RHSA-2010-0749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0749.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2010-0750.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0750.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2010-0751.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0751.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2010-0752.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0752.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2010-0753.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0753.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2010-0754.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0754.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2010-0755.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0755.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
38
reference_url http://www.securityfocus.com/bid/43845
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43845
39
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
40
reference_url http://www.vupen.com/english/advisories/2010/2897
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2897
41
reference_url http://www.vupen.com/english/advisories/2010/3097
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3097
42
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=595245
reference_id 595245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=595245
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3702
reference_id CVE-2010-3702
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3702
75
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
76
reference_url https://security.gentoo.org/glsa/201402-17
reference_id GLSA-201402-17
reference_type
scores
url https://security.gentoo.org/glsa/201402-17
77
reference_url https://access.redhat.com/errata/RHSA-2010:0749
reference_id RHSA-2010:0749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0749
78
reference_url https://access.redhat.com/errata/RHSA-2010:0750
reference_id RHSA-2010:0750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0750
79
reference_url https://access.redhat.com/errata/RHSA-2010:0751
reference_id RHSA-2010:0751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0751
80
reference_url https://access.redhat.com/errata/RHSA-2010:0752
reference_id RHSA-2010:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0752
81
reference_url https://access.redhat.com/errata/RHSA-2010:0753
reference_id RHSA-2010:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0753
82
reference_url https://access.redhat.com/errata/RHSA-2010:0754
reference_id RHSA-2010:0754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0754
83
reference_url https://access.redhat.com/errata/RHSA-2010:0755
reference_id RHSA-2010:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0755
84
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
85
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
86
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2010-3702
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-neqs-cg1p-7bb7
28
url VCID-qayv-8u9a-83h4
vulnerability_id VCID-qayv-8u9a-83h4
summary
KPdf includes vulnerable Xpdf code to handle PDF files, making it
    vulnerable to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0301
reference_id
reference_type
scores
0
value 0.03084
scoring_system epss
scoring_elements 0.86717
published_at 2026-04-01T12:55:00Z
1
value 0.03084
scoring_system epss
scoring_elements 0.86727
published_at 2026-04-02T12:55:00Z
2
value 0.03084
scoring_system epss
scoring_elements 0.86746
published_at 2026-04-04T12:55:00Z
3
value 0.03084
scoring_system epss
scoring_elements 0.86745
published_at 2026-04-07T12:55:00Z
4
value 0.03084
scoring_system epss
scoring_elements 0.86764
published_at 2026-04-08T12:55:00Z
5
value 0.03084
scoring_system epss
scoring_elements 0.86773
published_at 2026-04-09T12:55:00Z
6
value 0.03084
scoring_system epss
scoring_elements 0.86786
published_at 2026-04-11T12:55:00Z
7
value 0.03084
scoring_system epss
scoring_elements 0.86783
published_at 2026-04-12T12:55:00Z
8
value 0.03084
scoring_system epss
scoring_elements 0.86778
published_at 2026-04-13T12:55:00Z
9
value 0.03084
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-16T12:55:00Z
10
value 0.03084
scoring_system epss
scoring_elements 0.86798
published_at 2026-04-18T12:55:00Z
11
value 0.03084
scoring_system epss
scoring_elements 0.86795
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0301
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617882
reference_id 1617882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617882
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783
reference_id 350783
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783
5
reference_url https://security.gentoo.org/glsa/200602-04
reference_id GLSA-200602-04
reference_type
scores
url https://security.gentoo.org/glsa/200602-04
6
reference_url https://security.gentoo.org/glsa/200602-05
reference_id GLSA-200602-05
reference_type
scores
url https://security.gentoo.org/glsa/200602-05
7
reference_url https://security.gentoo.org/glsa/200602-12
reference_id GLSA-200602-12
reference_type
scores
url https://security.gentoo.org/glsa/200602-12
8
reference_url https://access.redhat.com/errata/RHSA-2006:0201
reference_id RHSA-2006:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0201
9
reference_url https://access.redhat.com/errata/RHSA-2006:0206
reference_id RHSA-2006:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0206
10
reference_url https://usn.ubuntu.com/249-1/
reference_id USN-249-1
reference_type
scores
url https://usn.ubuntu.com/249-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2006-0301
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qayv-8u9a-83h4
29
url VCID-rm6a-c4rf-f7hc
vulnerability_id VCID-rm6a-c4rf-f7hc
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
reference_id
reference_type
scores
0
value 0.08985
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-01T12:55:00Z
1
value 0.08985
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-02T12:55:00Z
2
value 0.08985
scoring_system epss
scoring_elements 0.92587
published_at 2026-04-04T12:55:00Z
3
value 0.08985
scoring_system epss
scoring_elements 0.92588
published_at 2026-04-07T12:55:00Z
4
value 0.08985
scoring_system epss
scoring_elements 0.926
published_at 2026-04-08T12:55:00Z
5
value 0.08985
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-09T12:55:00Z
6
value 0.08985
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-13T12:55:00Z
7
value 0.08985
scoring_system epss
scoring_elements 0.92611
published_at 2026-04-12T12:55:00Z
8
value 0.08985
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-16T12:55:00Z
9
value 0.08985
scoring_system epss
scoring_elements 0.92623
published_at 2026-04-18T12:55:00Z
10
value 0.08985
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495887
reference_id 495887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495887
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0800
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc
30
url VCID-s66u-r7vs-bfdu
vulnerability_id VCID-s66u-r7vs-bfdu
summary
Multiple vulnerabilities have been discovered in T1Lib, the worst
    of which could lead to remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1553.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1553.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1553
reference_id
reference_type
scores
0
value 0.04953
scoring_system epss
scoring_elements 0.89664
published_at 2026-04-21T12:55:00Z
1
value 0.04953
scoring_system epss
scoring_elements 0.89616
published_at 2026-04-01T12:55:00Z
2
value 0.04953
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-02T12:55:00Z
3
value 0.04953
scoring_system epss
scoring_elements 0.89632
published_at 2026-04-04T12:55:00Z
4
value 0.04953
scoring_system epss
scoring_elements 0.89633
published_at 2026-04-07T12:55:00Z
5
value 0.04953
scoring_system epss
scoring_elements 0.8965
published_at 2026-04-08T12:55:00Z
6
value 0.04953
scoring_system epss
scoring_elements 0.89655
published_at 2026-04-09T12:55:00Z
7
value 0.04953
scoring_system epss
scoring_elements 0.89662
published_at 2026-04-11T12:55:00Z
8
value 0.04953
scoring_system epss
scoring_elements 0.89661
published_at 2026-04-12T12:55:00Z
9
value 0.04953
scoring_system epss
scoring_elements 0.89654
published_at 2026-04-13T12:55:00Z
10
value 0.04953
scoring_system epss
scoring_elements 0.89669
published_at 2026-04-16T12:55:00Z
11
value 0.04953
scoring_system epss
scoring_elements 0.8967
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1553
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553
4
reference_url http://secunia.com/advisories/43823
reference_id
reference_type
scores
url http://secunia.com/advisories/43823
5
reference_url http://secunia.com/advisories/48985
reference_id
reference_type
scores
url http://secunia.com/advisories/48985
6
reference_url http://securityreason.com/securityalert/8171
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8171
7
reference_url http://securitytracker.com/id?1025266
reference_id
reference_type
scores
url http://securitytracker.com/id?1025266
8
reference_url http://www.foolabs.com/xpdf/download.html
reference_id
reference_type
scores
url http://www.foolabs.com/xpdf/download.html
9
reference_url http://www.kb.cert.org/vuls/id/376500
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/376500
10
reference_url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
12
reference_url http://www.securityfocus.com/archive/1/517205/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517205/100/0/threaded
13
reference_url http://www.toucan-system.com/advisories/tssa-2011-01.txt
reference_id
reference_type
scores
url http://www.toucan-system.com/advisories/tssa-2011-01.txt
14
reference_url http://www.vupen.com/english/advisories/2011/0728
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0728
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692854
reference_id 692854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692854
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1553
reference_id CVE-2011-1553
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1553
81
reference_url https://security.gentoo.org/glsa/201701-57
reference_id GLSA-201701-57
reference_type
scores
url https://security.gentoo.org/glsa/201701-57
82
reference_url https://access.redhat.com/errata/RHSA-2012:0062
reference_id RHSA-2012:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0062
83
reference_url https://access.redhat.com/errata/RHSA-2012:0137
reference_id RHSA-2012:0137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0137
84
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
85
reference_url https://usn.ubuntu.com/1335-1/
reference_id USN-1335-1
reference_type
scores
url https://usn.ubuntu.com/1335-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2011-1553
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s66u-r7vs-bfdu
31
url VCID-sv3r-4tym-qua5
vulnerability_id VCID-sv3r-4tym-qua5
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5393
reference_id
reference_type
scores
0
value 0.14245
scoring_system epss
scoring_elements 0.94355
published_at 2026-04-01T12:55:00Z
1
value 0.14245
scoring_system epss
scoring_elements 0.94364
published_at 2026-04-02T12:55:00Z
2
value 0.14245
scoring_system epss
scoring_elements 0.94374
published_at 2026-04-04T12:55:00Z
3
value 0.14245
scoring_system epss
scoring_elements 0.94375
published_at 2026-04-07T12:55:00Z
4
value 0.14245
scoring_system epss
scoring_elements 0.94385
published_at 2026-04-08T12:55:00Z
5
value 0.14245
scoring_system epss
scoring_elements 0.94389
published_at 2026-04-09T12:55:00Z
6
value 0.14245
scoring_system epss
scoring_elements 0.94392
published_at 2026-04-11T12:55:00Z
7
value 0.14245
scoring_system epss
scoring_elements 0.94393
published_at 2026-04-12T12:55:00Z
8
value 0.14245
scoring_system epss
scoring_elements 0.94394
published_at 2026-04-13T12:55:00Z
9
value 0.14245
scoring_system epss
scoring_elements 0.94408
published_at 2026-04-16T12:55:00Z
10
value 0.14245
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-18T12:55:00Z
11
value 0.14245
scoring_system epss
scoring_elements 0.94417
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345121
reference_id 345121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345121
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1023
reference_id RHSA-2007:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1023
10
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
11
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
12
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
13
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
14
reference_url https://access.redhat.com/errata/RHSA-2007:1028
reference_id RHSA-2007:1028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1028
15
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
16
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
17
reference_url https://access.redhat.com/errata/RHSA-2007:1031
reference_id RHSA-2007:1031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1031
18
reference_url https://access.redhat.com/errata/RHSA-2007:1051
reference_id RHSA-2007:1051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1051
19
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
20
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-5393
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sv3r-4tym-qua5
32
url VCID-uczb-yext-6yfq
vulnerability_id VCID-uczb-yext-6yfq
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1188
reference_id
reference_type
scores
0
value 0.21975
scoring_system epss
scoring_elements 0.95736
published_at 2026-04-01T12:55:00Z
1
value 0.21975
scoring_system epss
scoring_elements 0.95745
published_at 2026-04-02T12:55:00Z
2
value 0.21975
scoring_system epss
scoring_elements 0.95753
published_at 2026-04-04T12:55:00Z
3
value 0.21975
scoring_system epss
scoring_elements 0.95755
published_at 2026-04-07T12:55:00Z
4
value 0.21975
scoring_system epss
scoring_elements 0.95764
published_at 2026-04-08T12:55:00Z
5
value 0.21975
scoring_system epss
scoring_elements 0.95767
published_at 2026-04-09T12:55:00Z
6
value 0.21975
scoring_system epss
scoring_elements 0.95771
published_at 2026-04-12T12:55:00Z
7
value 0.21975
scoring_system epss
scoring_elements 0.95772
published_at 2026-04-13T12:55:00Z
8
value 0.21975
scoring_system epss
scoring_elements 0.95781
published_at 2026-04-16T12:55:00Z
9
value 0.21975
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-18T12:55:00Z
10
value 0.21975
scoring_system epss
scoring_elements 0.95787
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1188
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495907
reference_id 495907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495907
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779
reference_id 575779
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-1188
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uczb-yext-6yfq
33
url VCID-uny2-k19n-1bb2
vulnerability_id VCID-uny2-k19n-1bb2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
reference_id
reference_type
scores
0
value 0.02433
scoring_system epss
scoring_elements 0.85086
published_at 2026-04-01T12:55:00Z
1
value 0.02433
scoring_system epss
scoring_elements 0.85098
published_at 2026-04-02T12:55:00Z
2
value 0.02433
scoring_system epss
scoring_elements 0.85116
published_at 2026-04-04T12:55:00Z
3
value 0.02433
scoring_system epss
scoring_elements 0.85119
published_at 2026-04-07T12:55:00Z
4
value 0.02433
scoring_system epss
scoring_elements 0.85141
published_at 2026-04-08T12:55:00Z
5
value 0.02433
scoring_system epss
scoring_elements 0.85148
published_at 2026-04-09T12:55:00Z
6
value 0.02433
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-11T12:55:00Z
7
value 0.02433
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-12T12:55:00Z
8
value 0.02433
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-13T12:55:00Z
9
value 0.02433
scoring_system epss
scoring_elements 0.85177
published_at 2026-04-21T12:55:00Z
10
value 0.02433
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495894
reference_id 495894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495894
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1181
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2
34
url VCID-upkc-66fh-wbby
vulnerability_id VCID-upkc-66fh-wbby
summary
Multiple vulnerabilities have been discovered in T1Lib, the worst
    of which could lead to remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0764.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0764.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0764
reference_id
reference_type
scores
0
value 0.31187
scoring_system epss
scoring_elements 0.96772
published_at 2026-04-21T12:55:00Z
1
value 0.31187
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-01T12:55:00Z
2
value 0.31187
scoring_system epss
scoring_elements 0.9674
published_at 2026-04-02T12:55:00Z
3
value 0.31187
scoring_system epss
scoring_elements 0.96741
published_at 2026-04-04T12:55:00Z
4
value 0.31187
scoring_system epss
scoring_elements 0.96745
published_at 2026-04-07T12:55:00Z
5
value 0.31187
scoring_system epss
scoring_elements 0.96753
published_at 2026-04-08T12:55:00Z
6
value 0.31187
scoring_system epss
scoring_elements 0.96754
published_at 2026-04-09T12:55:00Z
7
value 0.31187
scoring_system epss
scoring_elements 0.96757
published_at 2026-04-12T12:55:00Z
8
value 0.31187
scoring_system epss
scoring_elements 0.96759
published_at 2026-04-13T12:55:00Z
9
value 0.31187
scoring_system epss
scoring_elements 0.96765
published_at 2026-04-16T12:55:00Z
10
value 0.31187
scoring_system epss
scoring_elements 0.9677
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0764
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
4
reference_url http://secunia.com/advisories/43823
reference_id
reference_type
scores
url http://secunia.com/advisories/43823
5
reference_url http://secunia.com/advisories/47347
reference_id
reference_type
scores
url http://secunia.com/advisories/47347
6
reference_url http://secunia.com/advisories/48985
reference_id
reference_type
scores
url http://secunia.com/advisories/48985
7
reference_url http://securityreason.com/securityalert/8171
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8171
8
reference_url http://securitytracker.com/id?1025266
reference_id
reference_type
scores
url http://securitytracker.com/id?1025266
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66208
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66208
10
reference_url http://www.foolabs.com/xpdf/download.html
reference_id
reference_type
scores
url http://www.foolabs.com/xpdf/download.html
11
reference_url http://www.kb.cert.org/vuls/id/376500
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/376500
12
reference_url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:002
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:002
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
15
reference_url http://www.securityfocus.com/archive/1/517205/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517205/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/46941
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46941
17
reference_url http://www.toucan-system.com/advisories/tssa-2011-01.txt
reference_id
reference_type
scores
url http://www.toucan-system.com/advisories/tssa-2011-01.txt
18
reference_url http://www.ubuntu.com/usn/USN-1316-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1316-1
19
reference_url http://www.vupen.com/english/advisories/2011/0728
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0728
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692909
reference_id 692909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692909
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0764
reference_id CVE-2011-0764
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0764
86
reference_url https://security.gentoo.org/glsa/201701-57
reference_id GLSA-201701-57
reference_type
scores
url https://security.gentoo.org/glsa/201701-57
87
reference_url https://access.redhat.com/errata/RHSA-2012:0062
reference_id RHSA-2012:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0062
88
reference_url https://access.redhat.com/errata/RHSA-2012:0137
reference_id RHSA-2012:0137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0137
89
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
90
reference_url https://usn.ubuntu.com/1316-1/
reference_id USN-1316-1
reference_type
scores
url https://usn.ubuntu.com/1316-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2011-0764
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upkc-66fh-wbby
35
url VCID-utex-65f9-53cq
vulnerability_id VCID-utex-65f9-53cq
summary
KPdf and KWord both include vulnerable Xpdf code to handle PDF files,
    making them vulnerable to the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
4
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0177.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0177.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3625
reference_id
reference_type
scores
0
value 0.11286
scoring_system epss
scoring_elements 0.93555
published_at 2026-04-21T12:55:00Z
1
value 0.11286
scoring_system epss
scoring_elements 0.9349
published_at 2026-04-01T12:55:00Z
2
value 0.11286
scoring_system epss
scoring_elements 0.93499
published_at 2026-04-02T12:55:00Z
3
value 0.11286
scoring_system epss
scoring_elements 0.93507
published_at 2026-04-04T12:55:00Z
4
value 0.11286
scoring_system epss
scoring_elements 0.93506
published_at 2026-04-07T12:55:00Z
5
value 0.11286
scoring_system epss
scoring_elements 0.93515
published_at 2026-04-08T12:55:00Z
6
value 0.11286
scoring_system epss
scoring_elements 0.93518
published_at 2026-04-09T12:55:00Z
7
value 0.11286
scoring_system epss
scoring_elements 0.93523
published_at 2026-04-13T12:55:00Z
8
value 0.11286
scoring_system epss
scoring_elements 0.93522
published_at 2026-04-12T12:55:00Z
9
value 0.11286
scoring_system epss
scoring_elements 0.93542
published_at 2026-04-16T12:55:00Z
10
value 0.11286
scoring_system epss
scoring_elements 0.93548
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3625
8
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625
10
reference_url http://secunia.com/advisories/18147
reference_id
reference_type
scores
url http://secunia.com/advisories/18147
11
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
12
reference_url http://secunia.com/advisories/18312
reference_id
reference_type
scores
url http://secunia.com/advisories/18312
13
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
14
reference_url http://secunia.com/advisories/18329
reference_id
reference_type
scores
url http://secunia.com/advisories/18329
15
reference_url http://secunia.com/advisories/18332
reference_id
reference_type
scores
url http://secunia.com/advisories/18332
16
reference_url http://secunia.com/advisories/18334
reference_id
reference_type
scores
url http://secunia.com/advisories/18334
17
reference_url http://secunia.com/advisories/18335
reference_id
reference_type
scores
url http://secunia.com/advisories/18335
18
reference_url http://secunia.com/advisories/18338
reference_id
reference_type
scores
url http://secunia.com/advisories/18338
19
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
20
reference_url http://secunia.com/advisories/18373
reference_id
reference_type
scores
url http://secunia.com/advisories/18373
21
reference_url http://secunia.com/advisories/18375
reference_id
reference_type
scores
url http://secunia.com/advisories/18375
22
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
23
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
24
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
25
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
26
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
27
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
28
reference_url http://secunia.com/advisories/18414
reference_id
reference_type
scores
url http://secunia.com/advisories/18414
29
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
30
reference_url http://secunia.com/advisories/18423
reference_id
reference_type
scores
url http://secunia.com/advisories/18423
31
reference_url http://secunia.com/advisories/18425
reference_id
reference_type
scores
url http://secunia.com/advisories/18425
32
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
33
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
34
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
35
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
36
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
37
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
38
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
39
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
40
reference_url http://secunia.com/advisories/18642
reference_id
reference_type
scores
url http://secunia.com/advisories/18642
41
reference_url http://secunia.com/advisories/18644
reference_id
reference_type
scores
url http://secunia.com/advisories/18644
42
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
43
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
44
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
45
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
46
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
47
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
48
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
49
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
50
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
51
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
52
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
53
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
54
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
55
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
56
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
57
reference_url http://www.debian.org/security/2005/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-937
58
reference_url http://www.debian.org/security/2005/dsa-938
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-938
59
reference_url http://www.debian.org/security/2005/dsa-940
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-940
60
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
61
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
62
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
63
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
64
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
65
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
66
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
67
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
68
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
69
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
70
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
71
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
72
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
74
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
75
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
76
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
77
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
78
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
79
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
80
reference_url http://www.redhat.com/support/errata/RHSA-2006-0163.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0163.html
81
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
82
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
83
reference_url http://www.securityfocus.com/bid/16143
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16143
84
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
85
reference_url http://www.vupen.com/english/advisories/2006/0047
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0047
86
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
87
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617827
reference_id 1617827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617827
88
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
reference_id 346076
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_id cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3625
reference_id CVE-2005-3625
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2005-3625
217
reference_url https://security.gentoo.org/glsa/200601-02
reference_id GLSA-200601-02
reference_type
scores
url https://security.gentoo.org/glsa/200601-02
218
reference_url https://security.gentoo.org/glsa/200601-17
reference_id GLSA-200601-17
reference_type
scores
url https://security.gentoo.org/glsa/200601-17
219
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
220
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
221
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
222
reference_url https://access.redhat.com/errata/RHSA-2006:0163
reference_id RHSA-2006:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0163
223
reference_url https://access.redhat.com/errata/RHSA-2006:0177
reference_id RHSA-2006:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0177
224
reference_url https://usn.ubuntu.com/236-1/
reference_id USN-236-1
reference_type
scores
url https://usn.ubuntu.com/236-1/
225
reference_url https://usn.ubuntu.com/236-2/
reference_id USN-236-2
reference_type
scores
url https://usn.ubuntu.com/236-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-3625
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-utex-65f9-53cq
36
url VCID-vudr-8rrg-hufx
vulnerability_id VCID-vudr-8rrg-hufx
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
reference_id
reference_type
scores
0
value 0.01703
scoring_system epss
scoring_elements 0.82232
published_at 2026-04-01T12:55:00Z
1
value 0.01703
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-02T12:55:00Z
2
value 0.01703
scoring_system epss
scoring_elements 0.82264
published_at 2026-04-04T12:55:00Z
3
value 0.01703
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-07T12:55:00Z
4
value 0.01703
scoring_system epss
scoring_elements 0.82285
published_at 2026-04-08T12:55:00Z
5
value 0.01703
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-09T12:55:00Z
6
value 0.01703
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-11T12:55:00Z
7
value 0.01703
scoring_system epss
scoring_elements 0.82306
published_at 2026-04-12T12:55:00Z
8
value 0.01703
scoring_system epss
scoring_elements 0.823
published_at 2026-04-13T12:55:00Z
9
value 0.01703
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-18T12:55:00Z
10
value 0.01703
scoring_system epss
scoring_elements 0.82337
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495899
reference_id 495899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495899
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1183
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx
37
url VCID-wpgs-8fw5-wbhe
vulnerability_id VCID-wpgs-8fw5-wbhe
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5392
reference_id
reference_type
scores
0
value 0.06567
scoring_system epss
scoring_elements 0.91095
published_at 2026-04-01T12:55:00Z
1
value 0.06567
scoring_system epss
scoring_elements 0.911
published_at 2026-04-02T12:55:00Z
2
value 0.06567
scoring_system epss
scoring_elements 0.91109
published_at 2026-04-04T12:55:00Z
3
value 0.06567
scoring_system epss
scoring_elements 0.91117
published_at 2026-04-07T12:55:00Z
4
value 0.06567
scoring_system epss
scoring_elements 0.91129
published_at 2026-04-08T12:55:00Z
5
value 0.06567
scoring_system epss
scoring_elements 0.91135
published_at 2026-04-09T12:55:00Z
6
value 0.06567
scoring_system epss
scoring_elements 0.91143
published_at 2026-04-11T12:55:00Z
7
value 0.06567
scoring_system epss
scoring_elements 0.91144
published_at 2026-04-13T12:55:00Z
8
value 0.06567
scoring_system epss
scoring_elements 0.91168
published_at 2026-04-18T12:55:00Z
9
value 0.06567
scoring_system epss
scoring_elements 0.91172
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345111
reference_id 345111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345111
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
10
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
11
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
12
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
13
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
14
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
15
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
16
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-5392
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpgs-8fw5-wbhe
38
url VCID-xddx-numk-a7bn
vulnerability_id VCID-xddx-numk-a7bn
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3608
reference_id
reference_type
scores
0
value 0.12664
scoring_system epss
scoring_elements 0.93944
published_at 2026-04-01T12:55:00Z
1
value 0.12664
scoring_system epss
scoring_elements 0.93953
published_at 2026-04-02T12:55:00Z
2
value 0.12664
scoring_system epss
scoring_elements 0.93962
published_at 2026-04-04T12:55:00Z
3
value 0.12664
scoring_system epss
scoring_elements 0.93964
published_at 2026-04-07T12:55:00Z
4
value 0.12664
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-08T12:55:00Z
5
value 0.12664
scoring_system epss
scoring_elements 0.93976
published_at 2026-04-09T12:55:00Z
6
value 0.12664
scoring_system epss
scoring_elements 0.9398
published_at 2026-04-13T12:55:00Z
7
value 0.12664
scoring_system epss
scoring_elements 0.93995
published_at 2026-04-16T12:55:00Z
8
value 0.12664
scoring_system epss
scoring_elements 0.94
published_at 2026-04-18T12:55:00Z
9
value 0.12664
scoring_system epss
scoring_elements 0.94001
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526637
reference_id 526637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526637
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
8
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
9
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
10
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://access.redhat.com/errata/RHSA-2009:1513
reference_id RHSA-2009:1513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1513
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
15
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3608
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xddx-numk-a7bn
39
url VCID-xqh5-sxfb-gueh
vulnerability_id VCID-xqh5-sxfb-gueh
summary
Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and
    Poppler potentially resulting in the execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
2
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
3
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
4
reference_url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
5
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
6
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
7
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
8
reference_url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2005-868.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-868.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3192
reference_id
reference_type
scores
0
value 0.12279
scoring_system epss
scoring_elements 0.93887
published_at 2026-04-21T12:55:00Z
1
value 0.12279
scoring_system epss
scoring_elements 0.9382
published_at 2026-04-01T12:55:00Z
2
value 0.12279
scoring_system epss
scoring_elements 0.93829
published_at 2026-04-02T12:55:00Z
3
value 0.12279
scoring_system epss
scoring_elements 0.93838
published_at 2026-04-04T12:55:00Z
4
value 0.12279
scoring_system epss
scoring_elements 0.93841
published_at 2026-04-07T12:55:00Z
5
value 0.12279
scoring_system epss
scoring_elements 0.93849
published_at 2026-04-08T12:55:00Z
6
value 0.12279
scoring_system epss
scoring_elements 0.93853
published_at 2026-04-09T12:55:00Z
7
value 0.12279
scoring_system epss
scoring_elements 0.93858
published_at 2026-04-13T12:55:00Z
8
value 0.12279
scoring_system epss
scoring_elements 0.9388
published_at 2026-04-16T12:55:00Z
9
value 0.12279
scoring_system epss
scoring_elements 0.93886
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3192
12
reference_url http://scary.beasts.org/security/CESA-2005-003.txt
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2005-003.txt
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
14
reference_url http://secunia.com/advisories/17897/
reference_id
reference_type
scores
url http://secunia.com/advisories/17897/
15
reference_url http://secunia.com/advisories/17908
reference_id
reference_type
scores
url http://secunia.com/advisories/17908
16
reference_url http://secunia.com/advisories/17912
reference_id
reference_type
scores
url http://secunia.com/advisories/17912
17
reference_url http://secunia.com/advisories/17916
reference_id
reference_type
scores
url http://secunia.com/advisories/17916
18
reference_url http://secunia.com/advisories/17920
reference_id
reference_type
scores
url http://secunia.com/advisories/17920
19
reference_url http://secunia.com/advisories/17921
reference_id
reference_type
scores
url http://secunia.com/advisories/17921
20
reference_url http://secunia.com/advisories/17926
reference_id
reference_type
scores
url http://secunia.com/advisories/17926
21
reference_url http://secunia.com/advisories/17929
reference_id
reference_type
scores
url http://secunia.com/advisories/17929
22
reference_url http://secunia.com/advisories/17940
reference_id
reference_type
scores
url http://secunia.com/advisories/17940
23
reference_url http://secunia.com/advisories/17955
reference_id
reference_type
scores
url http://secunia.com/advisories/17955
24
reference_url http://secunia.com/advisories/17976
reference_id
reference_type
scores
url http://secunia.com/advisories/17976
25
reference_url http://secunia.com/advisories/18009
reference_id
reference_type
scores
url http://secunia.com/advisories/18009
26
reference_url http://secunia.com/advisories/18055
reference_id
reference_type
scores
url http://secunia.com/advisories/18055
27
reference_url http://secunia.com/advisories/18061
reference_id
reference_type
scores
url http://secunia.com/advisories/18061
28
reference_url http://secunia.com/advisories/18189
reference_id
reference_type
scores
url http://secunia.com/advisories/18189
29
reference_url http://secunia.com/advisories/18191
reference_id
reference_type
scores
url http://secunia.com/advisories/18191
30
reference_url http://secunia.com/advisories/18192
reference_id
reference_type
scores
url http://secunia.com/advisories/18192
31
reference_url http://secunia.com/advisories/18303
reference_id
reference_type
scores
url http://secunia.com/advisories/18303
32
reference_url http://secunia.com/advisories/18313
reference_id
reference_type
scores
url http://secunia.com/advisories/18313
33
reference_url http://secunia.com/advisories/18336
reference_id
reference_type
scores
url http://secunia.com/advisories/18336
34
reference_url http://secunia.com/advisories/18349
reference_id
reference_type
scores
url http://secunia.com/advisories/18349
35
reference_url http://secunia.com/advisories/18380
reference_id
reference_type
scores
url http://secunia.com/advisories/18380
36
reference_url http://secunia.com/advisories/18385
reference_id
reference_type
scores
url http://secunia.com/advisories/18385
37
reference_url http://secunia.com/advisories/18387
reference_id
reference_type
scores
url http://secunia.com/advisories/18387
38
reference_url http://secunia.com/advisories/18389
reference_id
reference_type
scores
url http://secunia.com/advisories/18389
39
reference_url http://secunia.com/advisories/18398
reference_id
reference_type
scores
url http://secunia.com/advisories/18398
40
reference_url http://secunia.com/advisories/18407
reference_id
reference_type
scores
url http://secunia.com/advisories/18407
41
reference_url http://secunia.com/advisories/18416
reference_id
reference_type
scores
url http://secunia.com/advisories/18416
42
reference_url http://secunia.com/advisories/18428
reference_id
reference_type
scores
url http://secunia.com/advisories/18428
43
reference_url http://secunia.com/advisories/18436
reference_id
reference_type
scores
url http://secunia.com/advisories/18436
44
reference_url http://secunia.com/advisories/18448
reference_id
reference_type
scores
url http://secunia.com/advisories/18448
45
reference_url http://secunia.com/advisories/18503
reference_id
reference_type
scores
url http://secunia.com/advisories/18503
46
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
47
reference_url http://secunia.com/advisories/18534
reference_id
reference_type
scores
url http://secunia.com/advisories/18534
48
reference_url http://secunia.com/advisories/18549
reference_id
reference_type
scores
url http://secunia.com/advisories/18549
49
reference_url http://secunia.com/advisories/18554
reference_id
reference_type
scores
url http://secunia.com/advisories/18554
50
reference_url http://secunia.com/advisories/18582
reference_id
reference_type
scores
url http://secunia.com/advisories/18582
51
reference_url http://secunia.com/advisories/18674
reference_id
reference_type
scores
url http://secunia.com/advisories/18674
52
reference_url http://secunia.com/advisories/18675
reference_id
reference_type
scores
url http://secunia.com/advisories/18675
53
reference_url http://secunia.com/advisories/18679
reference_id
reference_type
scores
url http://secunia.com/advisories/18679
54
reference_url http://secunia.com/advisories/18908
reference_id
reference_type
scores
url http://secunia.com/advisories/18908
55
reference_url http://secunia.com/advisories/18913
reference_id
reference_type
scores
url http://secunia.com/advisories/18913
56
reference_url http://secunia.com/advisories/19230
reference_id
reference_type
scores
url http://secunia.com/advisories/19230
57
reference_url http://secunia.com/advisories/19377
reference_id
reference_type
scores
url http://secunia.com/advisories/19377
58
reference_url http://secunia.com/advisories/19797
reference_id
reference_type
scores
url http://secunia.com/advisories/19797
59
reference_url http://secunia.com/advisories/19798
reference_id
reference_type
scores
url http://secunia.com/advisories/19798
60
reference_url http://secunia.com/advisories/25729
reference_id
reference_type
scores
url http://secunia.com/advisories/25729
61
reference_url http://secunia.com/advisories/26413
reference_id
reference_type
scores
url http://secunia.com/advisories/26413
62
reference_url http://securityreason.com/securityalert/235
reference_id
reference_type
scores
url http://securityreason.com/securityalert/235
63
reference_url http://securityreason.com/securityalert/240
reference_id
reference_type
scores
url http://securityreason.com/securityalert/240
64
reference_url http://securitytracker.com/id?1015309
reference_id
reference_type
scores
url http://securitytracker.com/id?1015309
65
reference_url http://securitytracker.com/id?1015324
reference_id
reference_type
scores
url http://securitytracker.com/id?1015324
66
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23442
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23442
67
reference_url https://issues.rpath.com/browse/RPL-1609
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1609
68
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
69
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
70
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914
71
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
72
reference_url http://www.debian.org/security/2005/dsa-931
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-931
73
reference_url http://www.debian.org/security/2005/dsa-932
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-932
74
reference_url http://www.debian.org/security/2006/dsa-936
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-936
75
reference_url http://www.debian.org/security/2006/dsa-937
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-937
76
reference_url http://www.debian.org/security/2006/dsa-950
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-950
77
reference_url http://www.debian.org/security/2006/dsa-961
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-961
78
reference_url http://www.debian.org/security/2006/dsa-962
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-962
79
reference_url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
80
reference_url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
81
reference_url http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities
82
reference_url http://www.kde.org/info/security/advisory-20051207-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-1.txt
83
reference_url http://www.kde.org/info/security/advisory-20051207-2.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20051207-2.txt
84
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
85
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
86
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
87
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
88
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
89
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
90
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
91
reference_url http://www.novell.com/linux/security/advisories/2005_29_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_29_sr.html
92
reference_url http://www.novell.com/linux/security/advisories/2006_02_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_02_sr.html
93
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
94
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
95
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
96
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
97
reference_url http://www.redhat.com/support/errata/RHSA-2005-840.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-840.html
98
reference_url http://www.redhat.com/support/errata/RHSA-2005-867.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-867.html
99
reference_url http://www.redhat.com/support/errata/RHSA-2005-878.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-878.html
100
reference_url http://www.redhat.com/support/errata/RHSA-2006-0160.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0160.html
101
reference_url http://www.securityfocus.com/archive/1/418883/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/418883/100/0/threaded
102
reference_url http://www.securityfocus.com/archive/1/427053/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427053/100/0/threaded
103
reference_url http://www.securityfocus.com/archive/1/427990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/427990/100/0/threaded
104
reference_url http://www.securityfocus.com/bid/15725
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15725
105
reference_url http://www.trustix.org/errata/2005/0072/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0072/
106
reference_url http://www.ubuntulinux.org/usn/usn-227-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-227-1
107
reference_url http://www.vupen.com/english/advisories/2005/2755
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2755
108
reference_url http://www.vupen.com/english/advisories/2005/2786
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2786
109
reference_url http://www.vupen.com/english/advisories/2005/2787
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2787
110
reference_url http://www.vupen.com/english/advisories/2005/2788
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2788
111
reference_url http://www.vupen.com/english/advisories/2005/2789
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2789
112
reference_url http://www.vupen.com/english/advisories/2005/2790
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2790
113
reference_url http://www.vupen.com/english/advisories/2005/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2856
114
reference_url http://www.vupen.com/english/advisories/2007/2280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2280
115
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617797
reference_id 1617797
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617797
116
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
reference_id 342281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281
117
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
reference_id 342288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3192
reference_id CVE-2005-3192
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3192
120
reference_url https://security.gentoo.org/glsa/200512-08
reference_id GLSA-200512-08
reference_type
scores
url https://security.gentoo.org/glsa/200512-08
121
reference_url https://access.redhat.com/errata/RHSA-2005:840
reference_id RHSA-2005:840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:840
122
reference_url https://access.redhat.com/errata/RHSA-2005:867
reference_id RHSA-2005:867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:867
123
reference_url https://access.redhat.com/errata/RHSA-2005:868
reference_id RHSA-2005:868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:868
124
reference_url https://access.redhat.com/errata/RHSA-2005:878
reference_id RHSA-2005:878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:878
125
reference_url https://access.redhat.com/errata/RHSA-2006:0160
reference_id RHSA-2006:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0160
126
reference_url https://usn.ubuntu.com/227-1/
reference_id USN-227-1
reference_type
scores
url https://usn.ubuntu.com/227-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.01-9
purl pkg:deb/debian/xpdf@3.01-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-5r8r-hhhf-e3as
4
vulnerability VCID-65sa-tagy-3ybs
5
vulnerability VCID-6789-dh3f-rudp
6
vulnerability VCID-68rw-a4ah-5khm
7
vulnerability VCID-6dwz-8kx9-rugr
8
vulnerability VCID-byr3-7wgc-jye9
9
vulnerability VCID-ctb2-8h4y-vybd
10
vulnerability VCID-ctdw-25y5-8kdm
11
vulnerability VCID-dgb8-nes9-8fb7
12
vulnerability VCID-dn3b-smm9-63eb
13
vulnerability VCID-fct6-695j-t7bs
14
vulnerability VCID-gbm8-vcwy-u3g2
15
vulnerability VCID-gc6w-tctk-nycd
16
vulnerability VCID-jvuz-2phs-87du
17
vulnerability VCID-kgk7-hqby-wkez
18
vulnerability VCID-mq43-5wd8-ayan
19
vulnerability VCID-neqs-cg1p-7bb7
20
vulnerability VCID-rm6a-c4rf-f7hc
21
vulnerability VCID-s66u-r7vs-bfdu
22
vulnerability VCID-sv3r-4tym-qua5
23
vulnerability VCID-uczb-yext-6yfq
24
vulnerability VCID-uny2-k19n-1bb2
25
vulnerability VCID-upkc-66fh-wbby
26
vulnerability VCID-vudr-8rrg-hufx
27
vulnerability VCID-wpgs-8fw5-wbhe
28
vulnerability VCID-xddx-numk-a7bn
29
vulnerability VCID-ynvq-nzrq-9bca
30
vulnerability VCID-yu46-ypr2-dfce
31
vulnerability VCID-z77s-ej5r-rbcd
32
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9
aliases CVE-2005-3192
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqh5-sxfb-gueh
40
url VCID-ynvq-nzrq-9bca
vulnerability_id VCID-ynvq-nzrq-9bca
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
reference_id
reference_type
scores
0
value 0.01745
scoring_system epss
scoring_elements 0.8246
published_at 2026-04-01T12:55:00Z
1
value 0.01745
scoring_system epss
scoring_elements 0.82474
published_at 2026-04-02T12:55:00Z
2
value 0.01745
scoring_system epss
scoring_elements 0.82491
published_at 2026-04-04T12:55:00Z
3
value 0.01745
scoring_system epss
scoring_elements 0.82488
published_at 2026-04-07T12:55:00Z
4
value 0.01745
scoring_system epss
scoring_elements 0.82514
published_at 2026-04-08T12:55:00Z
5
value 0.01745
scoring_system epss
scoring_elements 0.82521
published_at 2026-04-09T12:55:00Z
6
value 0.01745
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-11T12:55:00Z
7
value 0.01745
scoring_system epss
scoring_elements 0.82536
published_at 2026-04-12T12:55:00Z
8
value 0.01745
scoring_system epss
scoring_elements 0.82531
published_at 2026-04-13T12:55:00Z
9
value 0.01745
scoring_system epss
scoring_elements 0.82568
published_at 2026-04-18T12:55:00Z
10
value 0.01745
scoring_system epss
scoring_elements 0.82572
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca
41
url VCID-yu46-ypr2-dfce
vulnerability_id VCID-yu46-ypr2-dfce
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3609
reference_id
reference_type
scores
0
value 0.05999
scoring_system epss
scoring_elements 0.90645
published_at 2026-04-01T12:55:00Z
1
value 0.05999
scoring_system epss
scoring_elements 0.9065
published_at 2026-04-02T12:55:00Z
2
value 0.05999
scoring_system epss
scoring_elements 0.9066
published_at 2026-04-04T12:55:00Z
3
value 0.05999
scoring_system epss
scoring_elements 0.90669
published_at 2026-04-07T12:55:00Z
4
value 0.05999
scoring_system epss
scoring_elements 0.90679
published_at 2026-04-08T12:55:00Z
5
value 0.05999
scoring_system epss
scoring_elements 0.90685
published_at 2026-04-09T12:55:00Z
6
value 0.05999
scoring_system epss
scoring_elements 0.90694
published_at 2026-04-12T12:55:00Z
7
value 0.05999
scoring_system epss
scoring_elements 0.9069
published_at 2026-04-13T12:55:00Z
8
value 0.05999
scoring_system epss
scoring_elements 0.90709
published_at 2026-04-16T12:55:00Z
9
value 0.05999
scoring_system epss
scoring_elements 0.90707
published_at 2026-04-18T12:55:00Z
10
value 0.05999
scoring_system epss
scoring_elements 0.90704
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3609
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526893
reference_id 526893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526893
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
12
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
13
reference_url https://access.redhat.com/errata/RHSA-2009:1513
reference_id RHSA-2009:1513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1513
14
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
15
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
16
reference_url https://access.redhat.com/errata/RHSA-2010:0401
reference_id RHSA-2010:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0401
17
reference_url https://access.redhat.com/errata/RHSA-2010:0755
reference_id RHSA-2010:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0755
18
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
19
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
20
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3609
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce
42
url VCID-z77s-ej5r-rbcd
vulnerability_id VCID-z77s-ej5r-rbcd
summary
Multiple vulnerabilities have been discovered in T1Lib, the worst
    of which could lead to remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1552.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1552.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1552
reference_id
reference_type
scores
0
value 0.22374
scoring_system epss
scoring_elements 0.95842
published_at 2026-04-21T12:55:00Z
1
value 0.22374
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-01T12:55:00Z
2
value 0.22374
scoring_system epss
scoring_elements 0.95795
published_at 2026-04-02T12:55:00Z
3
value 0.22374
scoring_system epss
scoring_elements 0.95803
published_at 2026-04-04T12:55:00Z
4
value 0.22374
scoring_system epss
scoring_elements 0.95806
published_at 2026-04-07T12:55:00Z
5
value 0.22374
scoring_system epss
scoring_elements 0.95814
published_at 2026-04-08T12:55:00Z
6
value 0.22374
scoring_system epss
scoring_elements 0.95818
published_at 2026-04-09T12:55:00Z
7
value 0.22374
scoring_system epss
scoring_elements 0.95821
published_at 2026-04-12T12:55:00Z
8
value 0.22374
scoring_system epss
scoring_elements 0.95823
published_at 2026-04-13T12:55:00Z
9
value 0.22374
scoring_system epss
scoring_elements 0.95834
published_at 2026-04-16T12:55:00Z
10
value 0.22374
scoring_system epss
scoring_elements 0.95839
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1552
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552
4
reference_url http://secunia.com/advisories/43823
reference_id
reference_type
scores
url http://secunia.com/advisories/43823
5
reference_url http://secunia.com/advisories/48985
reference_id
reference_type
scores
url http://secunia.com/advisories/48985
6
reference_url http://securityreason.com/securityalert/8171
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8171
7
reference_url http://securitytracker.com/id?1025266
reference_id
reference_type
scores
url http://securitytracker.com/id?1025266
8
reference_url http://www.foolabs.com/xpdf/download.html
reference_id
reference_type
scores
url http://www.foolabs.com/xpdf/download.html
9
reference_url http://www.kb.cert.org/vuls/id/376500
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/376500
10
reference_url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
12
reference_url http://www.securityfocus.com/archive/1/517205/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517205/100/0/threaded
13
reference_url http://www.toucan-system.com/advisories/tssa-2011-01.txt
reference_id
reference_type
scores
url http://www.toucan-system.com/advisories/tssa-2011-01.txt
14
reference_url http://www.vupen.com/english/advisories/2011/0728
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0728
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692853
reference_id 692853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692853
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1552
reference_id CVE-2011-1552
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1552
81
reference_url https://security.gentoo.org/glsa/201701-57
reference_id GLSA-201701-57
reference_type
scores
url https://security.gentoo.org/glsa/201701-57
82
reference_url https://access.redhat.com/errata/RHSA-2012:0062
reference_id RHSA-2012:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0062
83
reference_url https://access.redhat.com/errata/RHSA-2012:0137
reference_id RHSA-2012:0137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0137
84
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
85
reference_url https://usn.ubuntu.com/1335-1/
reference_id USN-1335-1
reference_type
scores
url https://usn.ubuntu.com/1335-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2011-1552
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z77s-ej5r-rbcd
43
url VCID-zr8n-mfu1-4yg4
vulnerability_id VCID-zr8n-mfu1-4yg4
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3606
reference_id
reference_type
scores
0
value 0.04772
scoring_system epss
scoring_elements 0.8942
published_at 2026-04-01T12:55:00Z
1
value 0.04772
scoring_system epss
scoring_elements 0.89424
published_at 2026-04-02T12:55:00Z
2
value 0.04772
scoring_system epss
scoring_elements 0.89435
published_at 2026-04-04T12:55:00Z
3
value 0.04772
scoring_system epss
scoring_elements 0.89437
published_at 2026-04-07T12:55:00Z
4
value 0.04772
scoring_system epss
scoring_elements 0.89453
published_at 2026-04-08T12:55:00Z
5
value 0.04772
scoring_system epss
scoring_elements 0.89457
published_at 2026-04-09T12:55:00Z
6
value 0.04772
scoring_system epss
scoring_elements 0.89465
published_at 2026-04-11T12:55:00Z
7
value 0.04772
scoring_system epss
scoring_elements 0.89463
published_at 2026-04-12T12:55:00Z
8
value 0.04772
scoring_system epss
scoring_elements 0.89459
published_at 2026-04-13T12:55:00Z
9
value 0.04772
scoring_system epss
scoring_elements 0.89474
published_at 2026-04-18T12:55:00Z
10
value 0.04772
scoring_system epss
scoring_elements 0.89472
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526877
reference_id 526877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526877
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
8
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
9
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
10
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
11
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
12
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3606
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr8n-mfu1-4yg4
Fixing_vulnerabilities
0
url VCID-5jvx-hqff-5ucp
vulnerability_id VCID-5jvx-hqff-5ucp
summary Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
references
0
reference_url http://marc.info/?l=bugtraq&m=109880927526773&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=109880927526773&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0889
reference_id
reference_type
scores
0
value 0.03388
scoring_system epss
scoring_elements 0.87411
published_at 2026-04-21T12:55:00Z
1
value 0.03388
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-01T12:55:00Z
2
value 0.03388
scoring_system epss
scoring_elements 0.87355
published_at 2026-04-02T12:55:00Z
3
value 0.03388
scoring_system epss
scoring_elements 0.87371
published_at 2026-04-04T12:55:00Z
4
value 0.03388
scoring_system epss
scoring_elements 0.8737
published_at 2026-04-07T12:55:00Z
5
value 0.03388
scoring_system epss
scoring_elements 0.87389
published_at 2026-04-08T12:55:00Z
6
value 0.03388
scoring_system epss
scoring_elements 0.87395
published_at 2026-04-09T12:55:00Z
7
value 0.03388
scoring_system epss
scoring_elements 0.87408
published_at 2026-04-11T12:55:00Z
8
value 0.03388
scoring_system epss
scoring_elements 0.87402
published_at 2026-04-12T12:55:00Z
9
value 0.03388
scoring_system epss
scoring_elements 0.87399
published_at 2026-04-13T12:55:00Z
10
value 0.03388
scoring_system epss
scoring_elements 0.87414
published_at 2026-04-16T12:55:00Z
11
value 0.03388
scoring_system epss
scoring_elements 0.87416
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0889
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0889
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17819
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17819
4
reference_url http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
5
reference_url http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
6
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
7
reference_url http://www.securityfocus.com/bid/11501
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11501
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0889
reference_id CVE-2004-0889
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-0889
102
reference_url https://usn.ubuntu.com/14-1/
reference_id USN-14-1
reference_type
scores
url https://usn.ubuntu.com/14-1/
103
reference_url https://usn.ubuntu.com/2-1/
reference_id USN-2-1
reference_type
scores
url https://usn.ubuntu.com/2-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.00-13.7
purl pkg:deb/debian/xpdf@3.00-13.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1z9b-trb7-2ubp
1
vulnerability VCID-35b2-jj1x-rkcf
2
vulnerability VCID-4128-ep6n-hufz
3
vulnerability VCID-4p26-wkq3-v3b2
4
vulnerability VCID-4yej-ag45-uuga
5
vulnerability VCID-5q1h-7uk2-nkhx
6
vulnerability VCID-5r8r-hhhf-e3as
7
vulnerability VCID-65sa-tagy-3ybs
8
vulnerability VCID-6789-dh3f-rudp
9
vulnerability VCID-68rw-a4ah-5khm
10
vulnerability VCID-6dwz-8kx9-rugr
11
vulnerability VCID-6wa8-zfbz-hqcg
12
vulnerability VCID-8uds-zs9k-47en
13
vulnerability VCID-bkr4-sab1-5ka2
14
vulnerability VCID-byr3-7wgc-jye9
15
vulnerability VCID-ctb2-8h4y-vybd
16
vulnerability VCID-ctdw-25y5-8kdm
17
vulnerability VCID-dgb8-nes9-8fb7
18
vulnerability VCID-dn3b-smm9-63eb
19
vulnerability VCID-durs-kj4r-jbf2
20
vulnerability VCID-fct6-695j-t7bs
21
vulnerability VCID-gbm8-vcwy-u3g2
22
vulnerability VCID-gc6w-tctk-nycd
23
vulnerability VCID-jvuz-2phs-87du
24
vulnerability VCID-kgk7-hqby-wkez
25
vulnerability VCID-mg1z-d7y8-dfaj
26
vulnerability VCID-mq43-5wd8-ayan
27
vulnerability VCID-neqs-cg1p-7bb7
28
vulnerability VCID-qayv-8u9a-83h4
29
vulnerability VCID-rm6a-c4rf-f7hc
30
vulnerability VCID-s66u-r7vs-bfdu
31
vulnerability VCID-sv3r-4tym-qua5
32
vulnerability VCID-uczb-yext-6yfq
33
vulnerability VCID-uny2-k19n-1bb2
34
vulnerability VCID-upkc-66fh-wbby
35
vulnerability VCID-utex-65f9-53cq
36
vulnerability VCID-vudr-8rrg-hufx
37
vulnerability VCID-wpgs-8fw5-wbhe
38
vulnerability VCID-xddx-numk-a7bn
39
vulnerability VCID-xqh5-sxfb-gueh
40
vulnerability VCID-ynvq-nzrq-9bca
41
vulnerability VCID-yu46-ypr2-dfce
42
vulnerability VCID-z77s-ej5r-rbcd
43
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7
aliases CVE-2004-0889
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jvx-hqff-5ucp
1
url VCID-7x99-rwuc-dyh9
vulnerability_id VCID-7x99-rwuc-dyh9
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1384.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1384
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21394
published_at 2026-04-01T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21561
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.2162
published_at 2026-04-04T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21375
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21453
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21513
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21524
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21486
published_at 2026-04-12T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.2143
published_at 2026-04-13T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21424
published_at 2026-04-16T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21431
published_at 2026-04-18T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21398
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1384
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616903
reference_id 1616903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616903
4
reference_url https://access.redhat.com/errata/RHSA-2002:295
reference_id RHSA-2002:295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:295
5
reference_url https://access.redhat.com/errata/RHSA-2002:307
reference_id RHSA-2002:307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:307
6
reference_url https://access.redhat.com/errata/RHSA-2003:037
reference_id RHSA-2003:037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:037
7
reference_url https://access.redhat.com/errata/RHSA-2003:216
reference_id RHSA-2003:216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:216
fixed_packages
0
url pkg:deb/debian/xpdf@3.00-13.7
purl pkg:deb/debian/xpdf@3.00-13.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1z9b-trb7-2ubp
1
vulnerability VCID-35b2-jj1x-rkcf
2
vulnerability VCID-4128-ep6n-hufz
3
vulnerability VCID-4p26-wkq3-v3b2
4
vulnerability VCID-4yej-ag45-uuga
5
vulnerability VCID-5q1h-7uk2-nkhx
6
vulnerability VCID-5r8r-hhhf-e3as
7
vulnerability VCID-65sa-tagy-3ybs
8
vulnerability VCID-6789-dh3f-rudp
9
vulnerability VCID-68rw-a4ah-5khm
10
vulnerability VCID-6dwz-8kx9-rugr
11
vulnerability VCID-6wa8-zfbz-hqcg
12
vulnerability VCID-8uds-zs9k-47en
13
vulnerability VCID-bkr4-sab1-5ka2
14
vulnerability VCID-byr3-7wgc-jye9
15
vulnerability VCID-ctb2-8h4y-vybd
16
vulnerability VCID-ctdw-25y5-8kdm
17
vulnerability VCID-dgb8-nes9-8fb7
18
vulnerability VCID-dn3b-smm9-63eb
19
vulnerability VCID-durs-kj4r-jbf2
20
vulnerability VCID-fct6-695j-t7bs
21
vulnerability VCID-gbm8-vcwy-u3g2
22
vulnerability VCID-gc6w-tctk-nycd
23
vulnerability VCID-jvuz-2phs-87du
24
vulnerability VCID-kgk7-hqby-wkez
25
vulnerability VCID-mg1z-d7y8-dfaj
26
vulnerability VCID-mq43-5wd8-ayan
27
vulnerability VCID-neqs-cg1p-7bb7
28
vulnerability VCID-qayv-8u9a-83h4
29
vulnerability VCID-rm6a-c4rf-f7hc
30
vulnerability VCID-s66u-r7vs-bfdu
31
vulnerability VCID-sv3r-4tym-qua5
32
vulnerability VCID-uczb-yext-6yfq
33
vulnerability VCID-uny2-k19n-1bb2
34
vulnerability VCID-upkc-66fh-wbby
35
vulnerability VCID-utex-65f9-53cq
36
vulnerability VCID-vudr-8rrg-hufx
37
vulnerability VCID-wpgs-8fw5-wbhe
38
vulnerability VCID-xddx-numk-a7bn
39
vulnerability VCID-xqh5-sxfb-gueh
40
vulnerability VCID-ynvq-nzrq-9bca
41
vulnerability VCID-yu46-ypr2-dfce
42
vulnerability VCID-z77s-ej5r-rbcd
43
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7
aliases CVE-2002-1384
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7x99-rwuc-dyh9
2
url VCID-ed1t-m9vp-7yay
vulnerability_id VCID-ed1t-m9vp-7yay
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0434.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0434
reference_id
reference_type
scores
0
value 0.29867
scoring_system epss
scoring_elements 0.96607
published_at 2026-04-01T12:55:00Z
1
value 0.29867
scoring_system epss
scoring_elements 0.96616
published_at 2026-04-02T12:55:00Z
2
value 0.29867
scoring_system epss
scoring_elements 0.96621
published_at 2026-04-04T12:55:00Z
3
value 0.29867
scoring_system epss
scoring_elements 0.96625
published_at 2026-04-07T12:55:00Z
4
value 0.29867
scoring_system epss
scoring_elements 0.96633
published_at 2026-04-08T12:55:00Z
5
value 0.29867
scoring_system epss
scoring_elements 0.96635
published_at 2026-04-09T12:55:00Z
6
value 0.29867
scoring_system epss
scoring_elements 0.96637
published_at 2026-04-11T12:55:00Z
7
value 0.29867
scoring_system epss
scoring_elements 0.96638
published_at 2026-04-12T12:55:00Z
8
value 0.29867
scoring_system epss
scoring_elements 0.9664
published_at 2026-04-13T12:55:00Z
9
value 0.29867
scoring_system epss
scoring_elements 0.96647
published_at 2026-04-16T12:55:00Z
10
value 0.29867
scoring_system epss
scoring_elements 0.96652
published_at 2026-04-18T12:55:00Z
11
value 0.29867
scoring_system epss
scoring_elements 0.96655
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0434
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617032
reference_id 1617032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617032
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22771.txt
reference_id CVE-2003-0434;OSVDB-9293
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22771.txt
5
reference_url https://www.securityfocus.com/bid/7912/info
reference_id CVE-2003-0434;OSVDB-9293
reference_type exploit
scores
url https://www.securityfocus.com/bid/7912/info
6
reference_url https://access.redhat.com/errata/RHSA-2003:196
reference_id RHSA-2003:196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:196
7
reference_url https://access.redhat.com/errata/RHSA-2003:197
reference_id RHSA-2003:197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:197
8
reference_url https://access.redhat.com/errata/RHSA-2003:216
reference_id RHSA-2003:216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:216
fixed_packages
0
url pkg:deb/debian/xpdf@3.00-13.7
purl pkg:deb/debian/xpdf@3.00-13.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1z9b-trb7-2ubp
1
vulnerability VCID-35b2-jj1x-rkcf
2
vulnerability VCID-4128-ep6n-hufz
3
vulnerability VCID-4p26-wkq3-v3b2
4
vulnerability VCID-4yej-ag45-uuga
5
vulnerability VCID-5q1h-7uk2-nkhx
6
vulnerability VCID-5r8r-hhhf-e3as
7
vulnerability VCID-65sa-tagy-3ybs
8
vulnerability VCID-6789-dh3f-rudp
9
vulnerability VCID-68rw-a4ah-5khm
10
vulnerability VCID-6dwz-8kx9-rugr
11
vulnerability VCID-6wa8-zfbz-hqcg
12
vulnerability VCID-8uds-zs9k-47en
13
vulnerability VCID-bkr4-sab1-5ka2
14
vulnerability VCID-byr3-7wgc-jye9
15
vulnerability VCID-ctb2-8h4y-vybd
16
vulnerability VCID-ctdw-25y5-8kdm
17
vulnerability VCID-dgb8-nes9-8fb7
18
vulnerability VCID-dn3b-smm9-63eb
19
vulnerability VCID-durs-kj4r-jbf2
20
vulnerability VCID-fct6-695j-t7bs
21
vulnerability VCID-gbm8-vcwy-u3g2
22
vulnerability VCID-gc6w-tctk-nycd
23
vulnerability VCID-jvuz-2phs-87du
24
vulnerability VCID-kgk7-hqby-wkez
25
vulnerability VCID-mg1z-d7y8-dfaj
26
vulnerability VCID-mq43-5wd8-ayan
27
vulnerability VCID-neqs-cg1p-7bb7
28
vulnerability VCID-qayv-8u9a-83h4
29
vulnerability VCID-rm6a-c4rf-f7hc
30
vulnerability VCID-s66u-r7vs-bfdu
31
vulnerability VCID-sv3r-4tym-qua5
32
vulnerability VCID-uczb-yext-6yfq
33
vulnerability VCID-uny2-k19n-1bb2
34
vulnerability VCID-upkc-66fh-wbby
35
vulnerability VCID-utex-65f9-53cq
36
vulnerability VCID-vudr-8rrg-hufx
37
vulnerability VCID-wpgs-8fw5-wbhe
38
vulnerability VCID-xddx-numk-a7bn
39
vulnerability VCID-xqh5-sxfb-gueh
40
vulnerability VCID-ynvq-nzrq-9bca
41
vulnerability VCID-yu46-ypr2-dfce
42
vulnerability VCID-z77s-ej5r-rbcd
43
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7
aliases CVE-2003-0434
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed1t-m9vp-7yay
3
url VCID-n7sa-m9h6-cqbv
vulnerability_id VCID-n7sa-m9h6-cqbv
summary security flaw
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
2
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921
3
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html
4
reference_url http://marc.info/?t=110378596500001&r=1&w=2
reference_id
reference_type
scores
url http://marc.info/?t=110378596500001&r=1&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1125.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1125.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1125
reference_id
reference_type
scores
0
value 0.07314
scoring_system epss
scoring_elements 0.917
published_at 2026-04-21T12:55:00Z
1
value 0.07314
scoring_system epss
scoring_elements 0.91642
published_at 2026-04-01T12:55:00Z
2
value 0.07314
scoring_system epss
scoring_elements 0.9165
published_at 2026-04-02T12:55:00Z
3
value 0.07314
scoring_system epss
scoring_elements 0.91656
published_at 2026-04-04T12:55:00Z
4
value 0.07314
scoring_system epss
scoring_elements 0.91665
published_at 2026-04-07T12:55:00Z
5
value 0.07314
scoring_system epss
scoring_elements 0.91677
published_at 2026-04-08T12:55:00Z
6
value 0.07314
scoring_system epss
scoring_elements 0.91684
published_at 2026-04-09T12:55:00Z
7
value 0.07314
scoring_system epss
scoring_elements 0.91687
published_at 2026-04-11T12:55:00Z
8
value 0.07314
scoring_system epss
scoring_elements 0.91689
published_at 2026-04-12T12:55:00Z
9
value 0.07314
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-13T12:55:00Z
10
value 0.07314
scoring_system epss
scoring_elements 0.91707
published_at 2026-04-16T12:55:00Z
11
value 0.07314
scoring_system epss
scoring_elements 0.91699
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1125
7
reference_url https://bugzilla.fedora.us/show_bug.cgi?id=2352
reference_id
reference_type
scores
url https://bugzilla.fedora.us/show_bug.cgi?id=2352
8
reference_url https://bugzilla.fedora.us/show_bug.cgi?id=2353
reference_id
reference_type
scores
url https://bugzilla.fedora.us/show_bug.cgi?id=2353
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125
10
reference_url http://secunia.com/advisories/17277
reference_id
reference_type
scores
url http://secunia.com/advisories/17277
11
reference_url http://securitytracker.com/id?1012646
reference_id
reference_type
scores
url http://securitytracker.com/id?1012646
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18641
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18641
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830
14
reference_url http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml
15
reference_url http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml
16
reference_url http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml
17
reference_url http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities
18
reference_url http://www.kde.org/info/security/advisory-20041223-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20041223-1.txt
19
reference_url http://www.novell.com/linux/security/advisories/2005_01_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_01_sr.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2005-013.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-013.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2005-018.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-018.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2005-026.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-026.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2005-034.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-034.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2005-053.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-053.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2005-057.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-057.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2005-066.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-066.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2005-354.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-354.html
28
reference_url http://www.securityfocus.com/bid/12070
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12070
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617371
reference_id 1617371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617371
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1125
reference_id CVE-2004-1125
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1125
35
reference_url https://access.redhat.com/errata/RHSA-2005:013
reference_id RHSA-2005:013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:013
36
reference_url https://access.redhat.com/errata/RHSA-2005:018
reference_id RHSA-2005:018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:018
37
reference_url https://access.redhat.com/errata/RHSA-2005:026
reference_id RHSA-2005:026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:026
38
reference_url https://access.redhat.com/errata/RHSA-2005:034
reference_id RHSA-2005:034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:034
39
reference_url https://access.redhat.com/errata/RHSA-2005:053
reference_id RHSA-2005:053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:053
40
reference_url https://access.redhat.com/errata/RHSA-2005:057
reference_id RHSA-2005:057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:057
41
reference_url https://access.redhat.com/errata/RHSA-2005:066
reference_id RHSA-2005:066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:066
42
reference_url https://access.redhat.com/errata/RHSA-2005:354
reference_id RHSA-2005:354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:354
43
reference_url https://usn.ubuntu.com/48-1/
reference_id USN-48-1
reference_type
scores
url https://usn.ubuntu.com/48-1/
44
reference_url https://usn.ubuntu.com/50-1/
reference_id USN-50-1
reference_type
scores
url https://usn.ubuntu.com/50-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.00-13.7
purl pkg:deb/debian/xpdf@3.00-13.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1z9b-trb7-2ubp
1
vulnerability VCID-35b2-jj1x-rkcf
2
vulnerability VCID-4128-ep6n-hufz
3
vulnerability VCID-4p26-wkq3-v3b2
4
vulnerability VCID-4yej-ag45-uuga
5
vulnerability VCID-5q1h-7uk2-nkhx
6
vulnerability VCID-5r8r-hhhf-e3as
7
vulnerability VCID-65sa-tagy-3ybs
8
vulnerability VCID-6789-dh3f-rudp
9
vulnerability VCID-68rw-a4ah-5khm
10
vulnerability VCID-6dwz-8kx9-rugr
11
vulnerability VCID-6wa8-zfbz-hqcg
12
vulnerability VCID-8uds-zs9k-47en
13
vulnerability VCID-bkr4-sab1-5ka2
14
vulnerability VCID-byr3-7wgc-jye9
15
vulnerability VCID-ctb2-8h4y-vybd
16
vulnerability VCID-ctdw-25y5-8kdm
17
vulnerability VCID-dgb8-nes9-8fb7
18
vulnerability VCID-dn3b-smm9-63eb
19
vulnerability VCID-durs-kj4r-jbf2
20
vulnerability VCID-fct6-695j-t7bs
21
vulnerability VCID-gbm8-vcwy-u3g2
22
vulnerability VCID-gc6w-tctk-nycd
23
vulnerability VCID-jvuz-2phs-87du
24
vulnerability VCID-kgk7-hqby-wkez
25
vulnerability VCID-mg1z-d7y8-dfaj
26
vulnerability VCID-mq43-5wd8-ayan
27
vulnerability VCID-neqs-cg1p-7bb7
28
vulnerability VCID-qayv-8u9a-83h4
29
vulnerability VCID-rm6a-c4rf-f7hc
30
vulnerability VCID-s66u-r7vs-bfdu
31
vulnerability VCID-sv3r-4tym-qua5
32
vulnerability VCID-uczb-yext-6yfq
33
vulnerability VCID-uny2-k19n-1bb2
34
vulnerability VCID-upkc-66fh-wbby
35
vulnerability VCID-utex-65f9-53cq
36
vulnerability VCID-vudr-8rrg-hufx
37
vulnerability VCID-wpgs-8fw5-wbhe
38
vulnerability VCID-xddx-numk-a7bn
39
vulnerability VCID-xqh5-sxfb-gueh
40
vulnerability VCID-ynvq-nzrq-9bca
41
vulnerability VCID-yu46-ypr2-dfce
42
vulnerability VCID-z77s-ej5r-rbcd
43
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7
aliases CVE-2004-1125
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7sa-m9h6-cqbv
4
url VCID-rdkz-72eg-7ubd
vulnerability_id VCID-rdkz-72eg-7ubd
summary security flaw
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt
2
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921
3
reference_url http://marc.info/?l=bugtraq&m=110625368019554&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110625368019554&w=2
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0064.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0064.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0064
reference_id
reference_type
scores
0
value 0.08395
scoring_system epss
scoring_elements 0.92334
published_at 2026-04-18T12:55:00Z
1
value 0.08395
scoring_system epss
scoring_elements 0.92285
published_at 2026-04-01T12:55:00Z
2
value 0.08395
scoring_system epss
scoring_elements 0.92292
published_at 2026-04-02T12:55:00Z
3
value 0.08395
scoring_system epss
scoring_elements 0.92298
published_at 2026-04-04T12:55:00Z
4
value 0.08395
scoring_system epss
scoring_elements 0.92301
published_at 2026-04-07T12:55:00Z
5
value 0.08395
scoring_system epss
scoring_elements 0.92312
published_at 2026-04-08T12:55:00Z
6
value 0.08395
scoring_system epss
scoring_elements 0.92317
published_at 2026-04-09T12:55:00Z
7
value 0.08395
scoring_system epss
scoring_elements 0.92323
published_at 2026-04-11T12:55:00Z
8
value 0.08395
scoring_system epss
scoring_elements 0.92324
published_at 2026-04-12T12:55:00Z
9
value 0.08395
scoring_system epss
scoring_elements 0.92322
published_at 2026-04-13T12:55:00Z
10
value 0.08395
scoring_system epss
scoring_elements 0.92335
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0064
6
reference_url https://bugzilla.fedora.us/show_bug.cgi?id=2352
reference_id
reference_type
scores
url https://bugzilla.fedora.us/show_bug.cgi?id=2352
7
reference_url https://bugzilla.fedora.us/show_bug.cgi?id=2353
reference_id
reference_type
scores
url https://bugzilla.fedora.us/show_bug.cgi?id=2353
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0064
9
reference_url http://secunia.com/advisories/17277
reference_id
reference_type
scores
url http://secunia.com/advisories/17277
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781
11
reference_url https://security.gentoo.org/glsa/200501-28
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/200501-28
12
reference_url https://security.gentoo.org/glsa/200502-10
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/200502-10
13
reference_url http://www.debian.org/security/2005/dsa-645
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-645
14
reference_url http://www.debian.org/security/2005/dsa-648
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-648
15
reference_url http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities
16
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:016
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:016
17
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:017
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:017
18
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:018
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:018
19
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:019
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:019
20
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:020
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:020
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:021
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:021
22
reference_url http://www.redhat.com/support/errata/RHSA-2005-026.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-026.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2005-034.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-034.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2005-053.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-053.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2005-057.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-057.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2005-059.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-059.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2005-066.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-066.html
28
reference_url http://www.trustix.org/errata/2005/0003/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0003/
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617441
reference_id 1617441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617441
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324459
reference_id 324459
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324459
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0064
reference_id CVE-2005-0064
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0064
64
reference_url https://access.redhat.com/errata/RHSA-2005:026
reference_id RHSA-2005:026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:026
65
reference_url https://access.redhat.com/errata/RHSA-2005:034
reference_id RHSA-2005:034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:034
66
reference_url https://access.redhat.com/errata/RHSA-2005:049
reference_id RHSA-2005:049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:049
67
reference_url https://access.redhat.com/errata/RHSA-2005:053
reference_id RHSA-2005:053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:053
68
reference_url https://access.redhat.com/errata/RHSA-2005:057
reference_id RHSA-2005:057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:057
69
reference_url https://access.redhat.com/errata/RHSA-2005:059
reference_id RHSA-2005:059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:059
70
reference_url https://access.redhat.com/errata/RHSA-2005:066
reference_id RHSA-2005:066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:066
71
reference_url https://usn.ubuntu.com/64-1/
reference_id USN-64-1
reference_type
scores
url https://usn.ubuntu.com/64-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.00-13.7
purl pkg:deb/debian/xpdf@3.00-13.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1z9b-trb7-2ubp
1
vulnerability VCID-35b2-jj1x-rkcf
2
vulnerability VCID-4128-ep6n-hufz
3
vulnerability VCID-4p26-wkq3-v3b2
4
vulnerability VCID-4yej-ag45-uuga
5
vulnerability VCID-5q1h-7uk2-nkhx
6
vulnerability VCID-5r8r-hhhf-e3as
7
vulnerability VCID-65sa-tagy-3ybs
8
vulnerability VCID-6789-dh3f-rudp
9
vulnerability VCID-68rw-a4ah-5khm
10
vulnerability VCID-6dwz-8kx9-rugr
11
vulnerability VCID-6wa8-zfbz-hqcg
12
vulnerability VCID-8uds-zs9k-47en
13
vulnerability VCID-bkr4-sab1-5ka2
14
vulnerability VCID-byr3-7wgc-jye9
15
vulnerability VCID-ctb2-8h4y-vybd
16
vulnerability VCID-ctdw-25y5-8kdm
17
vulnerability VCID-dgb8-nes9-8fb7
18
vulnerability VCID-dn3b-smm9-63eb
19
vulnerability VCID-durs-kj4r-jbf2
20
vulnerability VCID-fct6-695j-t7bs
21
vulnerability VCID-gbm8-vcwy-u3g2
22
vulnerability VCID-gc6w-tctk-nycd
23
vulnerability VCID-jvuz-2phs-87du
24
vulnerability VCID-kgk7-hqby-wkez
25
vulnerability VCID-mg1z-d7y8-dfaj
26
vulnerability VCID-mq43-5wd8-ayan
27
vulnerability VCID-neqs-cg1p-7bb7
28
vulnerability VCID-qayv-8u9a-83h4
29
vulnerability VCID-rm6a-c4rf-f7hc
30
vulnerability VCID-s66u-r7vs-bfdu
31
vulnerability VCID-sv3r-4tym-qua5
32
vulnerability VCID-uczb-yext-6yfq
33
vulnerability VCID-uny2-k19n-1bb2
34
vulnerability VCID-upkc-66fh-wbby
35
vulnerability VCID-utex-65f9-53cq
36
vulnerability VCID-vudr-8rrg-hufx
37
vulnerability VCID-wpgs-8fw5-wbhe
38
vulnerability VCID-xddx-numk-a7bn
39
vulnerability VCID-xqh5-sxfb-gueh
40
vulnerability VCID-ynvq-nzrq-9bca
41
vulnerability VCID-yu46-ypr2-dfce
42
vulnerability VCID-z77s-ej5r-rbcd
43
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7
aliases CVE-2005-0064
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rdkz-72eg-7ubd
5
url VCID-x49u-x3vn-f7gq
vulnerability_id VCID-x49u-x3vn-f7gq
summary security flaw
references
0
reference_url http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886
1
reference_url http://marc.info/?l=bugtraq&m=109880927526773&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=109880927526773&w=2
2
reference_url http://marc.info/?l=bugtraq&m=110815379627883&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110815379627883&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0888.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0888.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0888
reference_id
reference_type
scores
0
value 0.04443
scoring_system epss
scoring_elements 0.89064
published_at 2026-04-21T12:55:00Z
1
value 0.04443
scoring_system epss
scoring_elements 0.89
published_at 2026-04-01T12:55:00Z
2
value 0.04443
scoring_system epss
scoring_elements 0.89008
published_at 2026-04-02T12:55:00Z
3
value 0.04443
scoring_system epss
scoring_elements 0.89024
published_at 2026-04-04T12:55:00Z
4
value 0.04443
scoring_system epss
scoring_elements 0.89026
published_at 2026-04-07T12:55:00Z
5
value 0.04443
scoring_system epss
scoring_elements 0.89044
published_at 2026-04-08T12:55:00Z
6
value 0.04443
scoring_system epss
scoring_elements 0.89049
published_at 2026-04-09T12:55:00Z
7
value 0.04443
scoring_system epss
scoring_elements 0.8906
published_at 2026-04-11T12:55:00Z
8
value 0.04443
scoring_system epss
scoring_elements 0.89056
published_at 2026-04-12T12:55:00Z
9
value 0.04443
scoring_system epss
scoring_elements 0.89054
published_at 2026-04-13T12:55:00Z
10
value 0.04443
scoring_system epss
scoring_elements 0.89068
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0888
5
reference_url https://bugzilla.fedora.us/show_bug.cgi?id=2353
reference_id
reference_type
scores
url https://bugzilla.fedora.us/show_bug.cgi?id=2353
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0888
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714
9
reference_url https://www.ubuntu.com/usn/usn-9-1/
reference_id
reference_type
scores
url https://www.ubuntu.com/usn/usn-9-1/
10
reference_url http://www.debian.org/security/2004/dsa-573
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-573
11
reference_url http://www.debian.org/security/2004/dsa-581
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-581
12
reference_url http://www.debian.org/security/2004/dsa-599
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-599
13
reference_url http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
14
reference_url http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
15
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
16
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:114
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:114
17
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:115
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:115
18
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:116
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:116
19
reference_url http://www.redhat.com/support/errata/RHSA-2004-543.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2004-543.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2004-592.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2004-592.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2005-066.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-066.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2005-354.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-354.html
23
reference_url http://www.securityfocus.com/bid/11501
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11501
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617315
reference_id 1617315
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617315
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324460
reference_id 324460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324460
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0888
reference_id CVE-2004-0888
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-0888
120
reference_url https://access.redhat.com/errata/RHSA-2004:543
reference_id RHSA-2004:543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:543
121
reference_url https://access.redhat.com/errata/RHSA-2004:592
reference_id RHSA-2004:592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:592
122
reference_url https://access.redhat.com/errata/RHSA-2005:066
reference_id RHSA-2005:066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:066
123
reference_url https://access.redhat.com/errata/RHSA-2005:354
reference_id RHSA-2005:354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:354
124
reference_url https://usn.ubuntu.com/14-1/
reference_id USN-14-1
reference_type
scores
url https://usn.ubuntu.com/14-1/
125
reference_url https://usn.ubuntu.com/9-1/
reference_id USN-9-1
reference_type
scores
url https://usn.ubuntu.com/9-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.00-13.7
purl pkg:deb/debian/xpdf@3.00-13.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1z9b-trb7-2ubp
1
vulnerability VCID-35b2-jj1x-rkcf
2
vulnerability VCID-4128-ep6n-hufz
3
vulnerability VCID-4p26-wkq3-v3b2
4
vulnerability VCID-4yej-ag45-uuga
5
vulnerability VCID-5q1h-7uk2-nkhx
6
vulnerability VCID-5r8r-hhhf-e3as
7
vulnerability VCID-65sa-tagy-3ybs
8
vulnerability VCID-6789-dh3f-rudp
9
vulnerability VCID-68rw-a4ah-5khm
10
vulnerability VCID-6dwz-8kx9-rugr
11
vulnerability VCID-6wa8-zfbz-hqcg
12
vulnerability VCID-8uds-zs9k-47en
13
vulnerability VCID-bkr4-sab1-5ka2
14
vulnerability VCID-byr3-7wgc-jye9
15
vulnerability VCID-ctb2-8h4y-vybd
16
vulnerability VCID-ctdw-25y5-8kdm
17
vulnerability VCID-dgb8-nes9-8fb7
18
vulnerability VCID-dn3b-smm9-63eb
19
vulnerability VCID-durs-kj4r-jbf2
20
vulnerability VCID-fct6-695j-t7bs
21
vulnerability VCID-gbm8-vcwy-u3g2
22
vulnerability VCID-gc6w-tctk-nycd
23
vulnerability VCID-jvuz-2phs-87du
24
vulnerability VCID-kgk7-hqby-wkez
25
vulnerability VCID-mg1z-d7y8-dfaj
26
vulnerability VCID-mq43-5wd8-ayan
27
vulnerability VCID-neqs-cg1p-7bb7
28
vulnerability VCID-qayv-8u9a-83h4
29
vulnerability VCID-rm6a-c4rf-f7hc
30
vulnerability VCID-s66u-r7vs-bfdu
31
vulnerability VCID-sv3r-4tym-qua5
32
vulnerability VCID-uczb-yext-6yfq
33
vulnerability VCID-uny2-k19n-1bb2
34
vulnerability VCID-upkc-66fh-wbby
35
vulnerability VCID-utex-65f9-53cq
36
vulnerability VCID-vudr-8rrg-hufx
37
vulnerability VCID-wpgs-8fw5-wbhe
38
vulnerability VCID-xddx-numk-a7bn
39
vulnerability VCID-xqh5-sxfb-gueh
40
vulnerability VCID-ynvq-nzrq-9bca
41
vulnerability VCID-yu46-ypr2-dfce
42
vulnerability VCID-z77s-ej5r-rbcd
43
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7
aliases CVE-2004-0888
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x49u-x3vn-f7gq
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7