Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1050380?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1050380?format=api", "purl": "pkg:deb/debian/xpdf@3.00-13.7", "type": "deb", "namespace": "debian", "name": "xpdf", "version": "3.00-13.7", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "3.03-10", "latest_non_vulnerable_version": "3.03-10", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49939?format=api", "vulnerability_id": "VCID-1z9b-trb7-2ubp", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92776", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92732", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92742", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92761", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09332", "scoring_system": "epss", "scoring_elements": "0.92772", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3626" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18312" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18329" }, { "reference_url": "http://secunia.com/advisories/18332", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18332" }, { "reference_url": "http://secunia.com/advisories/18334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18334" }, { "reference_url": "http://secunia.com/advisories/18335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18335" }, { "reference_url": "http://secunia.com/advisories/18338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18338" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18373", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18373" }, { "reference_url": "http://secunia.com/advisories/18375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18375" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18414" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18423" }, { "reference_url": "http://secunia.com/advisories/18425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18425" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18463" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18642" }, { "reference_url": "http://secunia.com/advisories/18644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18644" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/16143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16143" }, { "reference_url": "http://www.trustix.org/errata/2006/0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0002/" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0047" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617828", "reference_id": "1617828", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617828" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3626", "reference_id": "CVE-2005-3626", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3626" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://security.gentoo.org/glsa/200601-17", "reference_id": "GLSA-200601-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0163", "reference_id": "RHSA-2006:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0177", "reference_id": "RHSA-2006:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0177" }, { "reference_url": "https://usn.ubuntu.com/236-1/", "reference_id": "USN-236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-1/" }, { "reference_url": "https://usn.ubuntu.com/236-2/", "reference_id": "USN-236-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-3626" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1z9b-trb7-2ubp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31238?format=api", "vulnerability_id": "VCID-35b2-jj1x-rkcf", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91751", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.9176", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91766", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91773", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91785", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91795", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91793", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91812", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91805", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91806", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526911", "reference_id": "526911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526911" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2009-3604" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35b2-jj1x-rkcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31247?format=api", "vulnerability_id": "VCID-4128-ep6n-hufz", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3704", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80423", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80338", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80345", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80365", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80354", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80382", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80392", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80411", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80418", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.8042", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704" }, { "reference_url": "http://secunia.com/advisories/42141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42141" }, { "reference_url": "http://secunia.com/advisories/42357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42357" }, { "reference_url": "http://secunia.com/advisories/42397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42397" }, { "reference_url": "http://secunia.com/advisories/42691", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42691" }, { "reference_url": "http://secunia.com/advisories/43079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43079" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2119" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2135", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2135" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "reference_url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/04/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "reference_url": "http://www.securityfocus.com/bid/43841", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/43841" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1005-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165", "reference_id": "599165", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960", "reference_id": "638960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704", "reference_id": "CVE-2010-3704", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://security.gentoo.org/glsa/201402-17", "reference_id": "GLSA-201402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0749", "reference_id": "RHSA-2010:0749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0751", "reference_id": "RHSA-2010:0751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0751" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0752", "reference_id": "RHSA-2010:0752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0753", "reference_id": "RHSA-2010:0753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0753" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0859", "reference_id": "RHSA-2010:0859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201", "reference_id": "RHSA-2012:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "reference_url": "https://usn.ubuntu.com/1005-1/", "reference_id": "USN-1005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1005-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2010-3704" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4128-ep6n-hufz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49942?format=api", "vulnerability_id": "VCID-4p26-wkq3-v3b2", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3628.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85866", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85777", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85789", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85813", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85832", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85842", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85857", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85854", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.8585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85868", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02683", "scoring_system": "epss", "scoring_elements": "0.85873", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617830", "reference_id": "1617830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617830" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3628", "reference_id": "CVE-2005-3628", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3628" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:867", "reference_id": "RHSA-2005:867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:878", "reference_id": "RHSA-2005:878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-3628" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4p26-wkq3-v3b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31246?format=api", "vulnerability_id": "VCID-4yej-ag45-uuga", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78249", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78164", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78203", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78226", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78222", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78252", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703" }, { "reference_url": "http://secunia.com/advisories/42357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42357" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/04/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1005-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165", "reference_id": "599165", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=639356", "reference_id": "639356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639356" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3703", "reference_id": "CVE-2010-3703", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3703" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0859", "reference_id": "RHSA-2010:0859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0859" }, { "reference_url": "https://usn.ubuntu.com/1005-1/", "reference_id": "USN-1005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1005-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2010-3703" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4yej-ag45-uuga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34312?format=api", "vulnerability_id": "VCID-5q1h-7uk2-nkhx", "summary": "Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n Poppler potentially resulting in the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-868.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3193", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86675", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86662", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86655", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86668", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193" }, { "reference_url": "http://secunia.com/advisories/17897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17897" }, { "reference_url": "http://secunia.com/advisories/17912", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17912" }, { "reference_url": "http://secunia.com/advisories/17916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17916" }, { "reference_url": "http://secunia.com/advisories/17920", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17920" }, { "reference_url": "http://secunia.com/advisories/17926", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17926" }, { "reference_url": "http://secunia.com/advisories/17929", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17929" }, { "reference_url": "http://secunia.com/advisories/17940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17940" }, { "reference_url": "http://secunia.com/advisories/17955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17955" }, { "reference_url": "http://secunia.com/advisories/17956", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17956" }, { "reference_url": "http://secunia.com/advisories/17959", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17959" }, { "reference_url": "http://secunia.com/advisories/17976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17976" }, { "reference_url": "http://secunia.com/advisories/18009", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18009" }, { "reference_url": "http://secunia.com/advisories/18055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18055" }, { "reference_url": "http://secunia.com/advisories/18061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18061" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18189" }, { "reference_url": "http://secunia.com/advisories/18191", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18191" }, { "reference_url": "http://secunia.com/advisories/18192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18192" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18336" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18520", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18520" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19125" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/19797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19797" }, { "reference_url": "http://secunia.com/advisories/19798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19798" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "http://secunia.com/advisories/26413", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26413" }, { "reference_url": "http://securityreason.com/securityalert/236", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/236" }, { "reference_url": "http://securitytracker.com/id?1015309", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015309" }, { "reference_url": "http://securitytracker.com/id?1015324", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015324" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23441" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1609" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-1.txt" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-840.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-867.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-878.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15721" }, { "reference_url": "http://www.trustix.org/errata/2005/0072/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0072/" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-227-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-227-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2787" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2789" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2790" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2856" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617798", "reference_id": "1617798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617798" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281", "reference_id": "342281", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288", "reference_id": "342288", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3193", "reference_id": "CVE-2005-3193", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3193" }, { "reference_url": "https://security.gentoo.org/glsa/200512-08", "reference_id": "GLSA-200512-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200512-08" }, { "reference_url": "https://security.gentoo.org/glsa/200603-02", "reference_id": "GLSA-200603-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200603-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:867", "reference_id": "RHSA-2005:867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:878", "reference_id": "RHSA-2005:878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://usn.ubuntu.com/227-1/", "reference_id": "USN-227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/227-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-3193" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5q1h-7uk2-nkhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31224?format=api", "vulnerability_id": "VCID-5r8r-hhhf-e3as", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0165", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82526", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82551", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82596", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8259", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82631", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-0165" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5r8r-hhhf-e3as" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31227?format=api", "vulnerability_id": "VCID-65sa-tagy-3ybs", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0799", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76577", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76601", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76643", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76631", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0799" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495886", "reference_id": "495886", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495886" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-0799" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92184?format=api", "vulnerability_id": "VCID-6789-dh3f-rudp", "summary": "zxpdf in xpdf before 3.02-19 as packaged in Debian unstable and 3.02-12+squeeze1 as packaged in Debian squeeze deletes temporary files insecurely, which allows remote attackers to delete arbitrary files via a crafted .pdf.gz file name.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2902", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69024", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.6904", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69061", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69041", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69091", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.6911", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69133", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69118", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69089", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69128", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69138", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69117", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2902" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635849", "reference_id": "635849", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635849" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1054359?format=api", "purl": "pkg:deb/debian/xpdf@3.03-10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.03-10" } ], "aliases": [ "CVE-2011-2902" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6789-dh3f-rudp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31233?format=api", "vulnerability_id": "VCID-68rw-a4ah-5khm", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91521", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91532", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91533", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91554", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91549", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495896", "reference_id": "495896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495896" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-1182" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31237?format=api", "vulnerability_id": "VCID-6dwz-8kx9-rugr", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90877", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90892", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90902", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90913", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.9092", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90928", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90929", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90952", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.9095", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90951", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526915", "reference_id": "526915", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526915" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1504", "reference_id": "RHSA-2009:1504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1504" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2009-3603" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwz-8kx9-rugr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56452?format=api", "vulnerability_id": "VCID-6wa8-zfbz-hqcg", "summary": "Multiple vulnerabilities in Xpdf could result in execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4035.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4035.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4035", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.8513", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85142", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85159", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85161", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85183", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85206", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85203", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.852", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85221", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0245", "scoring_system": "epss", "scoring_elements": "0.85223", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=541614", "reference_id": "541614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541614" }, { "reference_url": "https://security.gentoo.org/glsa/201402-17", "reference_id": "GLSA-201402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1680", "reference_id": "RHSA-2009:1680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1681", "reference_id": "RHSA-2009:1681", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1681" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1682", "reference_id": "RHSA-2009:1682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1682" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2009-4035" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6wa8-zfbz-hqcg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34308?format=api", "vulnerability_id": "VCID-8uds-zs9k-47en", "summary": "Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n Poppler potentially resulting in the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-868.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3191", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86675", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86662", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86655", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03031", "scoring_system": "epss", "scoring_elements": "0.86668", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191" }, { "reference_url": "http://secunia.com/advisories/17897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17897" }, { "reference_url": "http://secunia.com/advisories/17908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17908" }, { "reference_url": "http://secunia.com/advisories/17912", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17912" }, { "reference_url": "http://secunia.com/advisories/17916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17916" }, { "reference_url": "http://secunia.com/advisories/17920", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17920" }, { "reference_url": "http://secunia.com/advisories/17921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17921" }, { "reference_url": "http://secunia.com/advisories/17926", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17926" }, { "reference_url": "http://secunia.com/advisories/17929", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17929" }, { "reference_url": "http://secunia.com/advisories/17940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17940" }, { "reference_url": "http://secunia.com/advisories/17955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17955" }, { "reference_url": "http://secunia.com/advisories/17976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17976" }, { "reference_url": "http://secunia.com/advisories/18009", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18009" }, { "reference_url": "http://secunia.com/advisories/18055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18055" }, { "reference_url": "http://secunia.com/advisories/18061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18061" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18189" }, { "reference_url": "http://secunia.com/advisories/18191", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18191" }, { "reference_url": "http://secunia.com/advisories/18192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18192" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18336" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18503" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18549", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18549" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/19797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19797" }, { "reference_url": "http://secunia.com/advisories/19798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19798" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "http://secunia.com/advisories/26413", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26413" }, { "reference_url": "http://securityreason.com/securityalert/233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/233" }, { "reference_url": "http://securityreason.com/securityalert/234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/234" }, { "reference_url": "http://securitytracker.com/id?1015309", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015309" }, { "reference_url": "http://securitytracker.com/id?1015324", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015324" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23443" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23444" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1609" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-1.txt" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-840.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-867.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-878.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15726", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15726" }, { "reference_url": "http://www.securityfocus.com/bid/15727", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15727" }, { "reference_url": "http://www.trustix.org/errata/2005/0072/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0072/" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-227-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-227-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2786", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2786" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2787" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2788" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2789" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2790" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2856" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617796", "reference_id": "1617796", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617796" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281", "reference_id": "342281", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288", "reference_id": "342288", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3191", "reference_id": "CVE-2005-3191", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3191" }, { "reference_url": "https://security.gentoo.org/glsa/200512-08", "reference_id": "GLSA-200512-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200512-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:867", "reference_id": "RHSA-2005:867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:878", "reference_id": "RHSA-2005:878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://usn.ubuntu.com/227-1/", "reference_id": "USN-227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/227-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-3191" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uds-zs9k-47en" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49940?format=api", "vulnerability_id": "VCID-bkr4-sab1-5ka2", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3627", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88925", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88863", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88887", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88888", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88906", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88912", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88923", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88931", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04327", "scoring_system": "epss", "scoring_elements": "0.88929", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3627" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18312" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18329" }, { "reference_url": "http://secunia.com/advisories/18332", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18332" }, { "reference_url": "http://secunia.com/advisories/18334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18334" }, { "reference_url": "http://secunia.com/advisories/18335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18335" }, { "reference_url": "http://secunia.com/advisories/18338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18338" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18373", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18373" }, { "reference_url": "http://secunia.com/advisories/18375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18375" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18414" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18423" }, { "reference_url": "http://secunia.com/advisories/18425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18425" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18463" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18642" }, { "reference_url": "http://secunia.com/advisories/18644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18644" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24024" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24025" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/16143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16143" }, { "reference_url": "http://www.trustix.org/errata/2006/0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0002/" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0047" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617829", "reference_id": "1617829", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617829" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076", "reference_id": "346076", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3627", "reference_id": "CVE-2005-3627", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3627" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://security.gentoo.org/glsa/200601-17", "reference_id": "GLSA-200601-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0163", "reference_id": "RHSA-2006:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0177", "reference_id": "RHSA-2006:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0177" }, { "reference_url": "https://usn.ubuntu.com/236-1/", "reference_id": "USN-236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-1/" }, { "reference_url": "https://usn.ubuntu.com/236-2/", "reference_id": "USN-236-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-3627" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bkr4-sab1-5ka2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36522?format=api", "vulnerability_id": "VCID-byr3-7wgc-jye9", "summary": "Multiple vulnerabilities have been discovered in T1Lib, the worst\n of which could lead to remote execution of arbitrary code.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1554.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1554.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1554", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91179", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91108", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91124", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91143", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.9115", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91152", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06576", "scoring_system": "epss", "scoring_elements": "0.91176", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554" }, { "reference_url": "http://secunia.com/advisories/43823", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43823" }, { "reference_url": "http://secunia.com/advisories/48985", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48985" }, { "reference_url": "http://securityreason.com/securityalert/8171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/8171" }, { "reference_url": "http://securitytracker.com/id?1025266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1025266" }, { "reference_url": "http://www.foolabs.com/xpdf/download.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.foolabs.com/xpdf/download.html" }, { "reference_url": "http://www.kb.cert.org/vuls/id/376500", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/376500" }, { "reference_url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "reference_url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded" }, { "reference_url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0728", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0728" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=692856", "reference_id": "692856", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692856" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1554", "reference_id": "CVE-2011-1554", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1554" }, { "reference_url": "https://security.gentoo.org/glsa/201701-57", "reference_id": "GLSA-201701-57", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-57" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0062", "reference_id": "RHSA-2012:0062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0137", "reference_id": "RHSA-2012:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201", "reference_id": "RHSA-2012:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "reference_url": "https://usn.ubuntu.com/1335-1/", "reference_id": "USN-1335-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1335-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2011-1554" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byr3-7wgc-jye9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31225?format=api", "vulnerability_id": "VCID-ctb2-8h4y-vybd", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8988", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89916", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89927", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89934", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89931", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490625", "reference_id": "490625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490625" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-0166" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31226?format=api", "vulnerability_id": "VCID-ctdw-25y5-8kdm", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0195", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92595", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92601", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92607", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92629", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92642", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92641", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92645", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612", "reference_id": "490612", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-0195" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31223?format=api", "vulnerability_id": "VCID-dgb8-nes9-8fb7", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.8494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84959", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85008", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85023", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490614", "reference_id": "490614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490614" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-0147" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48283?format=api", "vulnerability_id": "VCID-dn3b-smm9-63eb", "summary": "Poppler does not handle fonts inside PDF files safely, allowing for\n execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1693.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1693.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.9181", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91844", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.9185", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91855", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91851", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91871", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91867", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07598", "scoring_system": "epss", "scoring_elements": "0.91865", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=441722", "reference_id": "441722", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441722" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476842", "reference_id": "476842", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476842" }, { "reference_url": "https://security.gentoo.org/glsa/200804-18", "reference_id": "GLSA-200804-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200804-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0238", "reference_id": "RHSA-2008:0238", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0238" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0239", "reference_id": "RHSA-2008:0239", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0239" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0240", "reference_id": "RHSA-2008:0240", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0240" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0262", "reference_id": "RHSA-2008:0262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0262" }, { "reference_url": "https://usn.ubuntu.com/603-1/", "reference_id": "USN-603-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/603-1/" }, { "reference_url": "https://usn.ubuntu.com/603-2/", "reference_id": "USN-603-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/603-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2008-1693" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dn3b-smm9-63eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89005?format=api", "vulnerability_id": "VCID-durs-kj4r-jbf2", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2097", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21881", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21883", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22045", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22098", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21956", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22011", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22026", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21985", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21927", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21924", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097" }, { "reference_url": "http://secunia.com/advisories/17277", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17277" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/21339", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21339" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-780", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-780" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1136" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:138", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:138" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-670.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-670.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-671.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-671.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-706.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-706.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-708.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-708.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/14529", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/14529" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617684", "reference_id": "1617684", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617684" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462", "reference_id": "322462", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464", "reference_id": "324464", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2097", "reference_id": "CVE-2005-2097", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:670", "reference_id": "RHSA-2005:670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:671", "reference_id": "RHSA-2005:671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:706", "reference_id": "RHSA-2005:706", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:706" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:708", "reference_id": "RHSA-2005:708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:708" }, { "reference_url": "https://usn.ubuntu.com/163-1/", "reference_id": "USN-163-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/163-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-2097" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-durs-kj4r-jbf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34873?format=api", "vulnerability_id": "VCID-fct6-695j-t7bs", "summary": "PDFKit and ImageKits are vulnerable to an integer overflow and a stack\n overflow allowing for the user-assisted execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92529", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92541", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92577", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08892", "scoring_system": "epss", "scoring_elements": "0.92579", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194", "reference_id": "248194", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460", "reference_id": "435460", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462", "reference_id": "435462", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462" }, { "reference_url": "https://security.gentoo.org/glsa/200709-12", "reference_id": "GLSA-200709-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200709-12" }, { "reference_url": "https://security.gentoo.org/glsa/200709-17", "reference_id": "GLSA-200709-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200709-17" }, { "reference_url": "https://security.gentoo.org/glsa/200710-08", "reference_id": "GLSA-200710-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-08" }, { "reference_url": "https://security.gentoo.org/glsa/200710-20", "reference_id": "GLSA-200710-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0720", "reference_id": "RHSA-2007:0720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0729", "reference_id": "RHSA-2007:0729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0730", "reference_id": "RHSA-2007:0730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0731", "reference_id": "RHSA-2007:0731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0732", "reference_id": "RHSA-2007:0732", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0732" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0735", "reference_id": "RHSA-2007:0735", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0735" }, { "reference_url": "https://usn.ubuntu.com/496-1/", "reference_id": "USN-496-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/496-1/" }, { "reference_url": "https://usn.ubuntu.com/496-2/", "reference_id": "USN-496-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/496-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2007-3387" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fct6-695j-t7bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31230?format=api", "vulnerability_id": "VCID-gbm8-vcwy-u3g2", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1179", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96426", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96433", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.9644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96456", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96457", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.9647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96473", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889", "reference_id": "495889", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-1179" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31248?format=api", "vulnerability_id": "VCID-gc6w-tctk-nycd", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2010-4653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2010-4653" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4653", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73766", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73775", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73677", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73709", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73682", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73717", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73729", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73751", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73724", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73767", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4653" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201310-03.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201310-03.xml" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2010-4653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2010-4653" }, { "reference_url": "http://www.securityfocus.com/bid/45948", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45948" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=672165", "reference_id": "672165", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672165" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4653", "reference_id": "CVE-2010-4653", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4653" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2010-4653" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gc6w-tctk-nycd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31231?format=api", "vulnerability_id": "VCID-jvuz-2phs-87du", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92498", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92526", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.9253", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92538", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92547", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92549", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495892", "reference_id": "495892", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495892" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-1180" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61422?format=api", "vulnerability_id": "VCID-kgk7-hqby-wkez", "summary": "Poppler and various KDE components are vulnerable to multiple memory\n management issues possibly resulting in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.9618", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96196", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96199", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96212", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96217", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96226", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96231", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.25469", "scoring_system": "epss", "scoring_elements": "0.96232", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4352" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=345101", "reference_id": "345101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=345101" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628", "reference_id": "450628", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629", "reference_id": "450629", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629" }, { "reference_url": "https://security.gentoo.org/glsa/200711-22", "reference_id": "GLSA-200711-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200711-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1021", "reference_id": "RHSA-2007:1021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1022", "reference_id": "RHSA-2007:1022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1024", "reference_id": "RHSA-2007:1024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1025", "reference_id": "RHSA-2007:1025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1026", "reference_id": "RHSA-2007:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1027", "reference_id": "RHSA-2007:1027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1029", "reference_id": "RHSA-2007:1029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1030", "reference_id": "RHSA-2007:1030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1030" }, { "reference_url": "https://usn.ubuntu.com/542-1/", "reference_id": "USN-542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-1/" }, { "reference_url": "https://usn.ubuntu.com/542-2/", "reference_id": "USN-542-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2007-4352" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kgk7-hqby-wkez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49937?format=api", "vulnerability_id": "VCID-mg1z-d7y8-dfaj", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91726", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91676", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91682", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91691", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91703", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.9171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91713", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91716", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91712", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91732", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07357", "scoring_system": "epss", "scoring_elements": "0.91725", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3624" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18312" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18329" }, { "reference_url": "http://secunia.com/advisories/18332", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18332" }, { "reference_url": "http://secunia.com/advisories/18334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18334" }, { "reference_url": "http://secunia.com/advisories/18338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18338" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18373", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18373" }, { "reference_url": "http://secunia.com/advisories/18375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18375" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18414" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18423" }, { "reference_url": "http://secunia.com/advisories/18425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18425" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18463" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18642" }, { "reference_url": "http://secunia.com/advisories/18644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18644" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/16143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16143" }, { "reference_url": "http://www.trustix.org/errata/2006/0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0002/" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0047" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617826", "reference_id": "1617826", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617826" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076", "reference_id": "346076", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3624", "reference_id": "CVE-2005-3624", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3624" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://security.gentoo.org/glsa/200601-17", "reference_id": "GLSA-200601-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0163", "reference_id": "RHSA-2006:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0177", "reference_id": "RHSA-2006:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0177" }, { "reference_url": "https://usn.ubuntu.com/236-1/", "reference_id": "USN-236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-1/" }, { "reference_url": "https://usn.ubuntu.com/236-2/", "reference_id": "USN-236-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-3624" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mg1z-d7y8-dfaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90704?format=api", "vulnerability_id": "VCID-mq43-5wd8-ayan", "summary": "xpdf infinite loop DoS", "references": [ { "reference_url": "http://docs.info.apple.com/article.html?artnum=305214", "reference_id": "", "reference_type": "", "scores": [], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "reference_url": "http://projects.info-pull.com/moab/MOAB-06-01-2007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://projects.info-pull.com/moab/MOAB-06-01-2007.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0104.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0104.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0104", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95338", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95284", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95301", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95314", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95322", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95324", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95331", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.19012", "scoring_system": "epss", "scoring_elements": "0.95335", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0104" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104" }, { "reference_url": "http://secunia.com/advisories/23791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23791" }, { "reference_url": "http://secunia.com/advisories/23799", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23799" }, { "reference_url": "http://secunia.com/advisories/23808", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23808" }, { "reference_url": "http://secunia.com/advisories/23813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23813" }, { "reference_url": "http://secunia.com/advisories/23815", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23815" }, { "reference_url": "http://secunia.com/advisories/23839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23839" }, { "reference_url": "http://secunia.com/advisories/23844", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23844" }, { "reference_url": "http://secunia.com/advisories/23876", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23876" }, { "reference_url": "http://secunia.com/advisories/24204", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24204" }, { "reference_url": "http://secunia.com/advisories/24479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24479" }, { "reference_url": "http://securitytracker.com/id?1017514", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1017514" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31364" }, { "reference_url": "https://issues.rpath.com/browse/RPL-964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-964" }, { "reference_url": "http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html" }, { "reference_url": "http://www.kde.org/info/security/advisory-20070115-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20070115-1.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:018" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:019", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:019" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:020", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:020" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:021" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:022" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:024" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_3_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_3_sr.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/457055/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/457055/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/21910", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/21910" }, { "reference_url": "http://www.securitytracker.com/id?1017749", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1017749" }, { "reference_url": "http://www.ubuntu.com/usn/usn-410-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-410-1" }, { "reference_url": "http://www.ubuntu.com/usn/usn-410-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-410-2" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0203", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0203" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0212", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0212" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0244" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0930", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852", "reference_id": "406852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=428126", "reference_id": "428126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428126" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0104", "reference_id": "CVE-2007-0104", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0104" }, { "reference_url": "https://usn.ubuntu.com/410-1/", "reference_id": "USN-410-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/410-1/" }, { "reference_url": "https://usn.ubuntu.com/410-2/", "reference_id": "USN-410-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/410-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2007-0104" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mq43-5wd8-ayan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31245?format=api", "vulnerability_id": "VCID-neqs-cg1p-7bb7", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3702", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86395", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86326", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86345", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86364", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86374", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86387", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86385", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.8638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86397", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86402", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" }, { "reference_url": "http://secunia.com/advisories/42141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42141" }, { "reference_url": "http://secunia.com/advisories/42357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42357" }, { "reference_url": "http://secunia.com/advisories/42397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42397" }, { "reference_url": "http://secunia.com/advisories/42691", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42691" }, { "reference_url": "http://secunia.com/advisories/43079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43079" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2119" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2135", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2135" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "reference_url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/04/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "reference_url": "http://www.securityfocus.com/bid/43845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/43845" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1005-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245", "reference_id": "595245", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165", "reference_id": "599165", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "reference_id": "CVE-2010-3702", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://security.gentoo.org/glsa/201402-17", "reference_id": "GLSA-201402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0749", "reference_id": "RHSA-2010:0749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0750", "reference_id": "RHSA-2010:0750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0751", "reference_id": "RHSA-2010:0751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0751" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0752", "reference_id": "RHSA-2010:0752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0753", "reference_id": "RHSA-2010:0753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0753" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0754", "reference_id": "RHSA-2010:0754", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0754" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0755", "reference_id": "RHSA-2010:0755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0859", "reference_id": "RHSA-2010:0859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201", "reference_id": "RHSA-2012:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "reference_url": "https://usn.ubuntu.com/1005-1/", "reference_id": "USN-1005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1005-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2010-3702" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-neqs-cg1p-7bb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50210?format=api", "vulnerability_id": "VCID-qayv-8u9a-83h4", "summary": "KPdf includes vulnerable Xpdf code to handle PDF files, making it\n vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0301", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86717", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86745", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86783", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86794", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86798", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03084", "scoring_system": "epss", "scoring_elements": "0.86795", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0301" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617882", "reference_id": "1617882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617882" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783", "reference_id": "350783", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783" }, { "reference_url": "https://security.gentoo.org/glsa/200602-04", "reference_id": "GLSA-200602-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200602-04" }, { "reference_url": "https://security.gentoo.org/glsa/200602-05", "reference_id": "GLSA-200602-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200602-05" }, { "reference_url": "https://security.gentoo.org/glsa/200602-12", "reference_id": "GLSA-200602-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200602-12" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0201", "reference_id": "RHSA-2006:0201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0206", "reference_id": "RHSA-2006:0206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0206" }, { "reference_url": "https://usn.ubuntu.com/249-1/", "reference_id": "USN-249-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/249-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2006-0301" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qayv-8u9a-83h4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31229?format=api", "vulnerability_id": "VCID-rm6a-c4rf-f7hc", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0800", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92575", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92581", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.926", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92605", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.9261", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92611", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92624", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92623", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92626", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0800" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495887", "reference_id": "495887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495887" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-0800" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36521?format=api", "vulnerability_id": "VCID-s66u-r7vs-bfdu", "summary": "Multiple vulnerabilities have been discovered in T1Lib, the worst\n of which could lead to remote execution of arbitrary code.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1553.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89616", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89632", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.8965", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89661", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89654", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.89669", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04953", "scoring_system": "epss", "scoring_elements": "0.8967", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553" }, { "reference_url": "http://secunia.com/advisories/43823", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43823" }, { "reference_url": "http://secunia.com/advisories/48985", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48985" }, { "reference_url": "http://securityreason.com/securityalert/8171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/8171" }, { "reference_url": "http://securitytracker.com/id?1025266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1025266" }, { "reference_url": "http://www.foolabs.com/xpdf/download.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.foolabs.com/xpdf/download.html" }, { "reference_url": "http://www.kb.cert.org/vuls/id/376500", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/376500" }, { "reference_url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "reference_url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded" }, { "reference_url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0728", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0728" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=692854", "reference_id": "692854", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692854" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1553", "reference_id": "CVE-2011-1553", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1553" }, { "reference_url": "https://security.gentoo.org/glsa/201701-57", "reference_id": "GLSA-201701-57", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-57" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0062", "reference_id": "RHSA-2012:0062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0137", "reference_id": "RHSA-2012:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201", "reference_id": "RHSA-2012:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "reference_url": "https://usn.ubuntu.com/1335-1/", "reference_id": "USN-1335-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1335-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2011-1553" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s66u-r7vs-bfdu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61424?format=api", "vulnerability_id": "VCID-sv3r-4tym-qua5", "summary": "Poppler and various KDE components are vulnerable to multiple memory\n management issues possibly resulting in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5393", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94355", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94375", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94389", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94392", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94394", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94408", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94413", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.14245", "scoring_system": "epss", "scoring_elements": "0.94417", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=345121", "reference_id": "345121", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=345121" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628", "reference_id": "450628", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629", "reference_id": "450629", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629" }, { "reference_url": "https://security.gentoo.org/glsa/200711-22", "reference_id": "GLSA-200711-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200711-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1021", "reference_id": "RHSA-2007:1021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1022", "reference_id": "RHSA-2007:1022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1023", "reference_id": "RHSA-2007:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1024", "reference_id": "RHSA-2007:1024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1025", "reference_id": "RHSA-2007:1025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1026", "reference_id": "RHSA-2007:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1027", "reference_id": "RHSA-2007:1027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1028", "reference_id": "RHSA-2007:1028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1029", "reference_id": "RHSA-2007:1029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1030", "reference_id": "RHSA-2007:1030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1031", "reference_id": "RHSA-2007:1031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1051", "reference_id": "RHSA-2007:1051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1051" }, { "reference_url": "https://usn.ubuntu.com/542-1/", "reference_id": "USN-542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-1/" }, { "reference_url": "https://usn.ubuntu.com/542-2/", "reference_id": "USN-542-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2007-5393" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sv3r-4tym-qua5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31236?format=api", "vulnerability_id": "VCID-uczb-yext-6yfq", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1188", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95736", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95745", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95753", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95786", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95787", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495907", "reference_id": "495907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495907" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779", "reference_id": "575779", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2009-1188" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uczb-yext-6yfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31232?format=api", "vulnerability_id": "VCID-uny2-k19n-1bb2", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85086", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.8516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85177", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85179", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495894", "reference_id": "495894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495894" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-1181" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36519?format=api", "vulnerability_id": "VCID-upkc-66fh-wbby", "summary": "Multiple vulnerabilities have been discovered in T1Lib, the worst\n of which could lead to remote execution of arbitrary code.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0764.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0764.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0764", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.96772", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.9673", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.9674", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.96741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.96745", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.96753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.96754", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.96757", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.96759", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.96765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.31187", "scoring_system": "epss", "scoring_elements": "0.9677", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764" }, { "reference_url": "http://secunia.com/advisories/43823", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43823" }, { "reference_url": "http://secunia.com/advisories/47347", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/47347" }, { "reference_url": "http://secunia.com/advisories/48985", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48985" }, { "reference_url": "http://securityreason.com/securityalert/8171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/8171" }, { "reference_url": "http://securitytracker.com/id?1025266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1025266" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66208" }, { "reference_url": "http://www.foolabs.com/xpdf/download.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.foolabs.com/xpdf/download.html" }, { "reference_url": "http://www.kb.cert.org/vuls/id/376500", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/376500" }, { "reference_url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:002" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "reference_url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/46941", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46941" }, { "reference_url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1316-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1316-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0728", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0728" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=692909", "reference_id": "692909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692909" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0764", "reference_id": "CVE-2011-0764", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0764" }, { "reference_url": "https://security.gentoo.org/glsa/201701-57", "reference_id": "GLSA-201701-57", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-57" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0062", "reference_id": "RHSA-2012:0062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0137", "reference_id": "RHSA-2012:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201", "reference_id": "RHSA-2012:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "reference_url": "https://usn.ubuntu.com/1316-1/", "reference_id": "USN-1316-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1316-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2011-0764" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upkc-66fh-wbby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49938?format=api", "vulnerability_id": "VCID-utex-65f9-53cq", "summary": "KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n making them vulnerable to the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0177.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93555", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.9349", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93499", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93506", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93515", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93518", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93522", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93542", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11286", "scoring_system": "epss", "scoring_elements": "0.93548", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3625" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625" }, { "reference_url": "http://secunia.com/advisories/18147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18147" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18312" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18329", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18329" }, { "reference_url": "http://secunia.com/advisories/18332", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18332" }, { "reference_url": "http://secunia.com/advisories/18334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18334" }, { "reference_url": "http://secunia.com/advisories/18335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18335" }, { "reference_url": "http://secunia.com/advisories/18338", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18338" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18373", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18373" }, { "reference_url": "http://secunia.com/advisories/18375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18375" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18414" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18423" }, { "reference_url": "http://secunia.com/advisories/18425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18425" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18463" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18642" }, { "reference_url": "http://secunia.com/advisories/18644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18644" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2005/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-937" }, { "reference_url": "http://www.debian.org/security/2005/dsa-938", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-938" }, { "reference_url": "http://www.debian.org/security/2005/dsa-940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-940" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0163.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/16143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16143" }, { "reference_url": "http://www.trustix.org/errata/2006/0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0002/" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0047" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617827", "reference_id": "1617827", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617827" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076", "reference_id": "346076", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3625", "reference_id": "CVE-2005-3625", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3625" }, { "reference_url": "https://security.gentoo.org/glsa/200601-02", "reference_id": "GLSA-200601-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-02" }, { "reference_url": "https://security.gentoo.org/glsa/200601-17", "reference_id": "GLSA-200601-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200601-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0163", "reference_id": "RHSA-2006:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0177", "reference_id": "RHSA-2006:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0177" }, { "reference_url": "https://usn.ubuntu.com/236-1/", "reference_id": "USN-236-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-1/" }, { "reference_url": "https://usn.ubuntu.com/236-2/", "reference_id": "USN-236-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/236-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-3625" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-utex-65f9-53cq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31234?format=api", "vulnerability_id": "VCID-vudr-8rrg-hufx", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82232", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82285", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82312", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82306", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.823", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82337", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495899", "reference_id": "495899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495899" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-1183" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61423?format=api", "vulnerability_id": "VCID-wpgs-8fw5-wbhe", "summary": "Poppler and various KDE components are vulnerable to multiple memory\n management issues possibly resulting in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5392", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91135", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91143", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91168", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06567", "scoring_system": "epss", "scoring_elements": "0.91172", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=345111", "reference_id": "345111", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=345111" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628", "reference_id": "450628", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629", "reference_id": "450629", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629" }, { "reference_url": "https://security.gentoo.org/glsa/200711-22", "reference_id": "GLSA-200711-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200711-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1021", "reference_id": "RHSA-2007:1021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1022", "reference_id": "RHSA-2007:1022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1024", "reference_id": "RHSA-2007:1024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1025", "reference_id": "RHSA-2007:1025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1026", "reference_id": "RHSA-2007:1026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1027", "reference_id": "RHSA-2007:1027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1029", "reference_id": "RHSA-2007:1029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:1030", "reference_id": "RHSA-2007:1030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:1030" }, { "reference_url": "https://usn.ubuntu.com/542-1/", "reference_id": "USN-542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-1/" }, { "reference_url": "https://usn.ubuntu.com/542-2/", "reference_id": "USN-542-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/542-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2007-5392" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpgs-8fw5-wbhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31242?format=api", "vulnerability_id": "VCID-xddx-numk-a7bn", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3608", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93944", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93953", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93962", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93973", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93976", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.9398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93995", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.94", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.94001", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526637", "reference_id": "526637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526637" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1504", "reference_id": "RHSA-2009:1504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1513", "reference_id": "RHSA-2009:1513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1513" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2009-3608" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xddx-numk-a7bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34310?format=api", "vulnerability_id": "VCID-xqh5-sxfb-gueh", "summary": "Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n Poppler potentially resulting in the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" }, { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-868.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93887", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.9382", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93838", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.9388", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12279", "scoring_system": "epss", "scoring_elements": "0.93886", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3192" }, { "reference_url": "http://scary.beasts.org/security/CESA-2005-003.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2005-003.txt" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192" }, { "reference_url": "http://secunia.com/advisories/17897/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17897/" }, { "reference_url": "http://secunia.com/advisories/17908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17908" }, { "reference_url": "http://secunia.com/advisories/17912", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17912" }, { "reference_url": "http://secunia.com/advisories/17916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17916" }, { "reference_url": "http://secunia.com/advisories/17920", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17920" }, { "reference_url": "http://secunia.com/advisories/17921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17921" }, { "reference_url": "http://secunia.com/advisories/17926", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17926" }, { "reference_url": "http://secunia.com/advisories/17929", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17929" }, { "reference_url": "http://secunia.com/advisories/17940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17940" }, { "reference_url": "http://secunia.com/advisories/17955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17955" }, { "reference_url": "http://secunia.com/advisories/17976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17976" }, { "reference_url": "http://secunia.com/advisories/18009", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18009" }, { "reference_url": "http://secunia.com/advisories/18055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18055" }, { "reference_url": "http://secunia.com/advisories/18061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18061" }, { "reference_url": "http://secunia.com/advisories/18189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18189" }, { "reference_url": "http://secunia.com/advisories/18191", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18191" }, { "reference_url": "http://secunia.com/advisories/18192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18192" }, { "reference_url": "http://secunia.com/advisories/18303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18303" }, { "reference_url": "http://secunia.com/advisories/18313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18313" }, { "reference_url": "http://secunia.com/advisories/18336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18336" }, { "reference_url": "http://secunia.com/advisories/18349", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18349" }, { "reference_url": "http://secunia.com/advisories/18380", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18380" }, { "reference_url": "http://secunia.com/advisories/18385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18385" }, { "reference_url": "http://secunia.com/advisories/18387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18387" }, { "reference_url": "http://secunia.com/advisories/18389", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18389" }, { "reference_url": "http://secunia.com/advisories/18398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18398" }, { "reference_url": "http://secunia.com/advisories/18407", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18407" }, { "reference_url": "http://secunia.com/advisories/18416", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18416" }, { "reference_url": "http://secunia.com/advisories/18428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18428" }, { "reference_url": "http://secunia.com/advisories/18436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18436" }, { "reference_url": "http://secunia.com/advisories/18448", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18448" }, { "reference_url": "http://secunia.com/advisories/18503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18503" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://secunia.com/advisories/18534", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18534" }, { "reference_url": "http://secunia.com/advisories/18549", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18549" }, { "reference_url": "http://secunia.com/advisories/18554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18554" }, { "reference_url": "http://secunia.com/advisories/18582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18582" }, { "reference_url": "http://secunia.com/advisories/18674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18674" }, { "reference_url": "http://secunia.com/advisories/18675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18675" }, { "reference_url": "http://secunia.com/advisories/18679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18679" }, { "reference_url": "http://secunia.com/advisories/18908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18908" }, { "reference_url": "http://secunia.com/advisories/18913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18913" }, { "reference_url": "http://secunia.com/advisories/19230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19230" }, { "reference_url": "http://secunia.com/advisories/19377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19377" }, { "reference_url": "http://secunia.com/advisories/19797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19797" }, { "reference_url": "http://secunia.com/advisories/19798", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19798" }, { "reference_url": "http://secunia.com/advisories/25729", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25729" }, { "reference_url": "http://secunia.com/advisories/26413", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26413" }, { "reference_url": "http://securityreason.com/securityalert/235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/235" }, { "reference_url": "http://securityreason.com/securityalert/240", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/240" }, { "reference_url": "http://securitytracker.com/id?1015309", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015309" }, { "reference_url": "http://securitytracker.com/id?1015324", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015324" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23442" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1609" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-931", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-931" }, { "reference_url": "http://www.debian.org/security/2005/dsa-932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-932" }, { "reference_url": "http://www.debian.org/security/2006/dsa-936", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-936" }, { "reference_url": "http://www.debian.org/security/2006/dsa-937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-937" }, { "reference_url": "http://www.debian.org/security/2006/dsa-950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-950" }, { "reference_url": "http://www.debian.org/security/2006/dsa-961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-961" }, { "reference_url": "http://www.debian.org/security/2006/dsa-962", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-962" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-1.txt" }, { "reference_url": "http://www.kde.org/info/security/advisory-20051207-2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20051207-2.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2006_02_sr.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-840.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-867.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-878.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15725", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15725" }, { "reference_url": "http://www.trustix.org/errata/2005/0072/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0072/" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-227-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-227-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2755", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2755" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2786", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2786" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2787" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2788" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2789" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2790" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2856" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2280" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617797", "reference_id": "1617797", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617797" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281", "reference_id": "342281", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288", "reference_id": "342288", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3192", "reference_id": "CVE-2005-3192", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3192" }, { "reference_url": "https://security.gentoo.org/glsa/200512-08", "reference_id": "GLSA-200512-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200512-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:840", "reference_id": "RHSA-2005:840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:867", "reference_id": "RHSA-2005:867", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:867" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:868", "reference_id": "RHSA-2005:868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:878", "reference_id": "RHSA-2005:878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0160", "reference_id": "RHSA-2006:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0160" }, { "reference_url": "https://usn.ubuntu.com/227-1/", "reference_id": "USN-227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/227-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050381?format=api", "purl": "pkg:deb/debian/xpdf@3.01-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9" } ], "aliases": [ "CVE-2005-3192" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqh5-sxfb-gueh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31221?format=api", "vulnerability_id": "VCID-ynvq-nzrq-9bca", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82514", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82568", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82572", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612", "reference_id": "490612", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050682?format=api", "purl": "pkg:deb/debian/xpdf@3.02-1.4%2Blenny4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4" } ], "aliases": [ "CVE-2009-0146" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31243?format=api", "vulnerability_id": "VCID-yu46-ypr2-dfce", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3609", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9065", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9066", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90669", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90685", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9069", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90709", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90707", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90704", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526893", "reference_id": "526893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526893" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1504", "reference_id": "RHSA-2009:1504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1513", "reference_id": "RHSA-2009:1513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1513" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0755", "reference_id": "RHSA-2010:0755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0755" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2009-3609" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36520?format=api", "vulnerability_id": "VCID-z77s-ej5r-rbcd", "summary": "Multiple vulnerabilities have been discovered in T1Lib, the worst\n of which could lead to remote execution of arbitrary code.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1552.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1552.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95842", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95786", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95795", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95818", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95821", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95823", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95834", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22374", "scoring_system": "epss", "scoring_elements": "0.95839", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552" }, { "reference_url": "http://secunia.com/advisories/43823", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43823" }, { "reference_url": "http://secunia.com/advisories/48985", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48985" }, { "reference_url": "http://securityreason.com/securityalert/8171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/8171" }, { "reference_url": "http://securitytracker.com/id?1025266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1025266" }, { "reference_url": "http://www.foolabs.com/xpdf/download.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.foolabs.com/xpdf/download.html" }, { "reference_url": "http://www.kb.cert.org/vuls/id/376500", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/376500" }, { "reference_url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "reference_url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded" }, { "reference_url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0728", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0728" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=692853", "reference_id": "692853", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692853" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1552", "reference_id": "CVE-2011-1552", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1552" }, { "reference_url": "https://security.gentoo.org/glsa/201701-57", "reference_id": "GLSA-201701-57", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-57" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0062", "reference_id": "RHSA-2012:0062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0137", "reference_id": "RHSA-2012:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201", "reference_id": "RHSA-2012:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "reference_url": "https://usn.ubuntu.com/1335-1/", "reference_id": "USN-1335-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1335-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2011-1552" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z77s-ej5r-rbcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31240?format=api", "vulnerability_id": "VCID-zr8n-mfu1-4yg4", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3606", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.8942", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89457", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89465", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89463", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89474", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89472", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526877", "reference_id": "526877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526877" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050683?format=api", "purl": "pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6789-dh3f-rudp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1" } ], "aliases": [ "CVE-2009-3606" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zr8n-mfu1-4yg4" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91208?format=api", "vulnerability_id": "VCID-5jvx-hqff-5ucp", "summary": "Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.", "references": [ { "reference_url": "http://marc.info/?l=bugtraq&m=109880927526773&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=109880927526773&w=2" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0889", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87346", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87355", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87371", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.8737", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87389", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87408", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87414", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03388", "scoring_system": "epss", "scoring_elements": "0.87416", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0889" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113" }, { "reference_url": "http://www.securityfocus.com/bid/11501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/11501" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0889", "reference_id": "CVE-2004-0889", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0889" }, { "reference_url": "https://usn.ubuntu.com/14-1/", "reference_id": "USN-14-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/14-1/" }, { "reference_url": "https://usn.ubuntu.com/2-1/", "reference_id": "USN-2-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050380?format=api", "purl": "pkg:deb/debian/xpdf@3.00-13.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z9b-trb7-2ubp" }, { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4p26-wkq3-v3b2" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5q1h-7uk2-nkhx" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-6wa8-zfbz-hqcg" }, { "vulnerability": "VCID-8uds-zs9k-47en" }, { "vulnerability": "VCID-bkr4-sab1-5ka2" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-durs-kj4r-jbf2" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mg1z-d7y8-dfaj" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-qayv-8u9a-83h4" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-utex-65f9-53cq" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-xqh5-sxfb-gueh" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7" } ], "aliases": [ "CVE-2004-0889" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5jvx-hqff-5ucp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89775?format=api", "vulnerability_id": "VCID-7x99-rwuc-dyh9", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1384.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21394", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21561", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2162", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21375", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21513", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21524", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21486", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2143", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21424", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21431", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21398", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1384" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", "reference_id": "1616903", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616903" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:295", "reference_id": "RHSA-2002:295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:307", "reference_id": "RHSA-2002:307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:037", "reference_id": "RHSA-2003:037", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:037" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:216", "reference_id": "RHSA-2003:216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:216" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050380?format=api", "purl": "pkg:deb/debian/xpdf@3.00-13.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z9b-trb7-2ubp" }, { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4p26-wkq3-v3b2" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5q1h-7uk2-nkhx" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-6wa8-zfbz-hqcg" }, { "vulnerability": "VCID-8uds-zs9k-47en" }, { "vulnerability": "VCID-bkr4-sab1-5ka2" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-durs-kj4r-jbf2" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mg1z-d7y8-dfaj" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-qayv-8u9a-83h4" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-utex-65f9-53cq" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-xqh5-sxfb-gueh" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7" } ], "aliases": [ "CVE-2002-1384" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7x99-rwuc-dyh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89672?format=api", "vulnerability_id": "VCID-ed1t-m9vp-7yay", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0434.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0434.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0434", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96621", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96625", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96633", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96637", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.9664", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96647", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.29867", "scoring_system": "epss", "scoring_elements": "0.96655", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0434" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617032", "reference_id": "1617032", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617032" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22771.txt", "reference_id": "CVE-2003-0434;OSVDB-9293", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22771.txt" }, { "reference_url": "https://www.securityfocus.com/bid/7912/info", "reference_id": "CVE-2003-0434;OSVDB-9293", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/7912/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:196", "reference_id": "RHSA-2003:196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:197", "reference_id": "RHSA-2003:197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:216", "reference_id": "RHSA-2003:216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:216" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050380?format=api", "purl": "pkg:deb/debian/xpdf@3.00-13.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z9b-trb7-2ubp" }, { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4p26-wkq3-v3b2" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5q1h-7uk2-nkhx" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-6wa8-zfbz-hqcg" }, { "vulnerability": "VCID-8uds-zs9k-47en" }, { "vulnerability": "VCID-bkr4-sab1-5ka2" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-durs-kj4r-jbf2" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mg1z-d7y8-dfaj" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-qayv-8u9a-83h4" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-utex-65f9-53cq" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-xqh5-sxfb-gueh" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7" } ], "aliases": [ "CVE-2003-0434" ], "risk_score": 0.6, "exploitability": "2.0", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ed1t-m9vp-7yay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89328?format=api", "vulnerability_id": "VCID-n7sa-m9h6-cqbv", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt" }, { "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921" }, { "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html" }, { "reference_url": "http://marc.info/?t=110378596500001&r=1&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?t=110378596500001&r=1&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1125.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1125.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1125", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.9165", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91656", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91665", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91677", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91687", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91689", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91686", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91707", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07314", "scoring_system": "epss", "scoring_elements": "0.91699", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1125" }, { "reference_url": "https://bugzilla.fedora.us/show_bug.cgi?id=2352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2352" }, { "reference_url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125" }, { "reference_url": "http://secunia.com/advisories/17277", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17277" }, { "reference_url": "http://securitytracker.com/id?1012646", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1012646" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18641" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities" }, { "reference_url": "http://www.kde.org/info/security/advisory-20041223-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20041223-1.txt" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-013.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-018.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-026.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-034.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-034.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-053.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-053.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-057.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-057.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-066.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-066.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-354.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-354.html" }, { "reference_url": "http://www.securityfocus.com/bid/12070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/12070" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617371", "reference_id": "1617371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617371" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1125", "reference_id": "CVE-2004-1125", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:013", "reference_id": "RHSA-2005:013", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:013" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:018", "reference_id": "RHSA-2005:018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:026", "reference_id": "RHSA-2005:026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:034", "reference_id": "RHSA-2005:034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:053", "reference_id": "RHSA-2005:053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:057", "reference_id": "RHSA-2005:057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:066", "reference_id": "RHSA-2005:066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:354", "reference_id": "RHSA-2005:354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:354" }, { "reference_url": "https://usn.ubuntu.com/48-1/", "reference_id": "USN-48-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/48-1/" }, { "reference_url": "https://usn.ubuntu.com/50-1/", "reference_id": "USN-50-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/50-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050380?format=api", "purl": "pkg:deb/debian/xpdf@3.00-13.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z9b-trb7-2ubp" }, { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4p26-wkq3-v3b2" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5q1h-7uk2-nkhx" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-6wa8-zfbz-hqcg" }, { "vulnerability": "VCID-8uds-zs9k-47en" }, { "vulnerability": "VCID-bkr4-sab1-5ka2" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-durs-kj4r-jbf2" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mg1z-d7y8-dfaj" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-qayv-8u9a-83h4" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-utex-65f9-53cq" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-xqh5-sxfb-gueh" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7" } ], "aliases": [ "CVE-2004-1125" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7sa-m9h6-cqbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89288?format=api", "vulnerability_id": "VCID-rdkz-72eg-7ubd", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl3.patch" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt" }, { "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921" }, { "reference_url": "http://marc.info/?l=bugtraq&m=110625368019554&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=110625368019554&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0064.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0064.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0064", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92334", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92292", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92301", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92312", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92323", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92324", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08395", "scoring_system": "epss", "scoring_elements": "0.92335", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0064" }, { "reference_url": "https://bugzilla.fedora.us/show_bug.cgi?id=2352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2352" }, { "reference_url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0064" }, { "reference_url": "http://secunia.com/advisories/17277", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17277" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11781" }, { "reference_url": "https://security.gentoo.org/glsa/200501-28", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200501-28" }, { "reference_url": "https://security.gentoo.org/glsa/200502-10", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200502-10" }, { "reference_url": "http://www.debian.org/security/2005/dsa-645", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-645" }, { "reference_url": "http://www.debian.org/security/2005/dsa-648", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-648" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:016", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:016" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:017", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:017" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:018" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:019", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:019" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:020", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:020" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:021" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-026.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-034.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-034.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-053.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-053.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-057.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-057.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-059.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-059.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-066.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-066.html" }, { "reference_url": "http://www.trustix.org/errata/2005/0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0003/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617441", "reference_id": "1617441", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617441" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324459", "reference_id": "324459", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324459" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.5a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.7a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0064", "reference_id": "CVE-2005-0064", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:026", "reference_id": "RHSA-2005:026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:034", "reference_id": "RHSA-2005:034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:049", "reference_id": "RHSA-2005:049", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:049" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:053", "reference_id": "RHSA-2005:053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:057", "reference_id": "RHSA-2005:057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:059", "reference_id": "RHSA-2005:059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:066", "reference_id": "RHSA-2005:066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:066" }, { "reference_url": "https://usn.ubuntu.com/64-1/", "reference_id": "USN-64-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/64-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050380?format=api", "purl": "pkg:deb/debian/xpdf@3.00-13.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z9b-trb7-2ubp" }, { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4p26-wkq3-v3b2" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5q1h-7uk2-nkhx" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-6wa8-zfbz-hqcg" }, { "vulnerability": "VCID-8uds-zs9k-47en" }, { "vulnerability": "VCID-bkr4-sab1-5ka2" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-durs-kj4r-jbf2" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mg1z-d7y8-dfaj" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-qayv-8u9a-83h4" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-utex-65f9-53cq" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-xqh5-sxfb-gueh" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7" } ], "aliases": [ "CVE-2005-0064" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rdkz-72eg-7ubd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89388?format=api", "vulnerability_id": "VCID-x49u-x3vn-f7gq", "summary": "security flaw", "references": [ { "reference_url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886", "reference_id": "", "reference_type": "", "scores": [], "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886" }, { "reference_url": "http://marc.info/?l=bugtraq&m=109880927526773&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=109880927526773&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=110815379627883&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=110815379627883&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0888.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0888.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0888", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89064", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89026", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89044", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.8906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89056", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89054", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04443", "scoring_system": "epss", "scoring_elements": "0.89068", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0888" }, { "reference_url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0888", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0888" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714" }, { "reference_url": "https://www.ubuntu.com/usn/usn-9-1/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.ubuntu.com/usn/usn-9-1/" }, { "reference_url": "http://www.debian.org/security/2004/dsa-573", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2004/dsa-573" }, { "reference_url": "http://www.debian.org/security/2004/dsa-581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2004/dsa-581" }, { "reference_url": "http://www.debian.org/security/2004/dsa-599", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2004/dsa-599" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2004-543.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-543.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2004-592.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-592.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-066.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-066.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-354.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-354.html" }, { "reference_url": "http://www.securityfocus.com/bid/11501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/11501" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617315", "reference_id": "1617315", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617315" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324460", "reference_id": "324460", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324460" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0888", "reference_id": "CVE-2004-0888", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:543", "reference_id": "RHSA-2004:543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:592", "reference_id": "RHSA-2004:592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:066", "reference_id": "RHSA-2005:066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:354", "reference_id": "RHSA-2005:354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:354" }, { "reference_url": "https://usn.ubuntu.com/14-1/", "reference_id": "USN-14-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/14-1/" }, { "reference_url": "https://usn.ubuntu.com/9-1/", "reference_id": "USN-9-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/9-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050380?format=api", "purl": "pkg:deb/debian/xpdf@3.00-13.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1z9b-trb7-2ubp" }, { "vulnerability": "VCID-35b2-jj1x-rkcf" }, { "vulnerability": "VCID-4128-ep6n-hufz" }, { "vulnerability": "VCID-4p26-wkq3-v3b2" }, { "vulnerability": "VCID-4yej-ag45-uuga" }, { "vulnerability": "VCID-5q1h-7uk2-nkhx" }, { "vulnerability": "VCID-5r8r-hhhf-e3as" }, { "vulnerability": "VCID-65sa-tagy-3ybs" }, { "vulnerability": "VCID-6789-dh3f-rudp" }, { "vulnerability": "VCID-68rw-a4ah-5khm" }, { "vulnerability": "VCID-6dwz-8kx9-rugr" }, { "vulnerability": "VCID-6wa8-zfbz-hqcg" }, { "vulnerability": "VCID-8uds-zs9k-47en" }, { "vulnerability": "VCID-bkr4-sab1-5ka2" }, { "vulnerability": "VCID-byr3-7wgc-jye9" }, { "vulnerability": "VCID-ctb2-8h4y-vybd" }, { "vulnerability": "VCID-ctdw-25y5-8kdm" }, { "vulnerability": "VCID-dgb8-nes9-8fb7" }, { "vulnerability": "VCID-dn3b-smm9-63eb" }, { "vulnerability": "VCID-durs-kj4r-jbf2" }, { "vulnerability": "VCID-fct6-695j-t7bs" }, { "vulnerability": "VCID-gbm8-vcwy-u3g2" }, { "vulnerability": "VCID-gc6w-tctk-nycd" }, { "vulnerability": "VCID-jvuz-2phs-87du" }, { "vulnerability": "VCID-kgk7-hqby-wkez" }, { "vulnerability": "VCID-mg1z-d7y8-dfaj" }, { "vulnerability": "VCID-mq43-5wd8-ayan" }, { "vulnerability": "VCID-neqs-cg1p-7bb7" }, { "vulnerability": "VCID-qayv-8u9a-83h4" }, { "vulnerability": "VCID-rm6a-c4rf-f7hc" }, { "vulnerability": "VCID-s66u-r7vs-bfdu" }, { "vulnerability": "VCID-sv3r-4tym-qua5" }, { "vulnerability": "VCID-uczb-yext-6yfq" }, { "vulnerability": "VCID-uny2-k19n-1bb2" }, { "vulnerability": "VCID-upkc-66fh-wbby" }, { "vulnerability": "VCID-utex-65f9-53cq" }, { "vulnerability": "VCID-vudr-8rrg-hufx" }, { "vulnerability": "VCID-wpgs-8fw5-wbhe" }, { "vulnerability": "VCID-xddx-numk-a7bn" }, { "vulnerability": "VCID-xqh5-sxfb-gueh" }, { "vulnerability": "VCID-ynvq-nzrq-9bca" }, { "vulnerability": "VCID-yu46-ypr2-dfce" }, { "vulnerability": "VCID-z77s-ej5r-rbcd" }, { "vulnerability": "VCID-zr8n-mfu1-4yg4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7" } ], "aliases": [ "CVE-2004-0888" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x49u-x3vn-f7gq" } ], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.00-13.7" }