Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xpdf@3.01-9.1%2Betch6
Typedeb
Namespacedebian
Namexpdf
Version3.01-9.1+etch6
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.03-10
Latest_non_vulnerable_version3.03-10
Affected_by_vulnerabilities
0
url VCID-35b2-jj1x-rkcf
vulnerability_id VCID-35b2-jj1x-rkcf
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3604
reference_id
reference_type
scores
0
value 0.07495
scoring_system epss
scoring_elements 0.91751
published_at 2026-04-01T12:55:00Z
1
value 0.07495
scoring_system epss
scoring_elements 0.9176
published_at 2026-04-02T12:55:00Z
2
value 0.07495
scoring_system epss
scoring_elements 0.91766
published_at 2026-04-04T12:55:00Z
3
value 0.07495
scoring_system epss
scoring_elements 0.91773
published_at 2026-04-07T12:55:00Z
4
value 0.07495
scoring_system epss
scoring_elements 0.91785
published_at 2026-04-08T12:55:00Z
5
value 0.07495
scoring_system epss
scoring_elements 0.91792
published_at 2026-04-09T12:55:00Z
6
value 0.07495
scoring_system epss
scoring_elements 0.91795
published_at 2026-04-11T12:55:00Z
7
value 0.07495
scoring_system epss
scoring_elements 0.91797
published_at 2026-04-12T12:55:00Z
8
value 0.07495
scoring_system epss
scoring_elements 0.91793
published_at 2026-04-13T12:55:00Z
9
value 0.07495
scoring_system epss
scoring_elements 0.91812
published_at 2026-04-16T12:55:00Z
10
value 0.07495
scoring_system epss
scoring_elements 0.91805
published_at 2026-04-18T12:55:00Z
11
value 0.07495
scoring_system epss
scoring_elements 0.91806
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526911
reference_id 526911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526911
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
8
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
9
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
10
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
11
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
12
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
13
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
14
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3604
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35b2-jj1x-rkcf
1
url VCID-4128-ep6n-hufz
vulnerability_id VCID-4128-ep6n-hufz
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3704
reference_id
reference_type
scores
0
value 0.01395
scoring_system epss
scoring_elements 0.80423
published_at 2026-04-21T12:55:00Z
1
value 0.01395
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-01T12:55:00Z
2
value 0.01395
scoring_system epss
scoring_elements 0.80345
published_at 2026-04-02T12:55:00Z
3
value 0.01395
scoring_system epss
scoring_elements 0.80365
published_at 2026-04-04T12:55:00Z
4
value 0.01395
scoring_system epss
scoring_elements 0.80354
published_at 2026-04-07T12:55:00Z
5
value 0.01395
scoring_system epss
scoring_elements 0.80382
published_at 2026-04-08T12:55:00Z
6
value 0.01395
scoring_system epss
scoring_elements 0.80392
published_at 2026-04-09T12:55:00Z
7
value 0.01395
scoring_system epss
scoring_elements 0.80411
published_at 2026-04-11T12:55:00Z
8
value 0.01395
scoring_system epss
scoring_elements 0.80396
published_at 2026-04-12T12:55:00Z
9
value 0.01395
scoring_system epss
scoring_elements 0.80389
published_at 2026-04-13T12:55:00Z
10
value 0.01395
scoring_system epss
scoring_elements 0.80418
published_at 2026-04-16T12:55:00Z
11
value 0.01395
scoring_system epss
scoring_elements 0.8042
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3704
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
14
reference_url http://secunia.com/advisories/42141
reference_id
reference_type
scores
url http://secunia.com/advisories/42141
15
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
16
reference_url http://secunia.com/advisories/42397
reference_id
reference_type
scores
url http://secunia.com/advisories/42397
17
reference_url http://secunia.com/advisories/42691
reference_id
reference_type
scores
url http://secunia.com/advisories/42691
18
reference_url http://secunia.com/advisories/43079
reference_id
reference_type
scores
url http://secunia.com/advisories/43079
19
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
20
reference_url http://www.debian.org/security/2010/dsa-2119
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2119
21
reference_url http://www.debian.org/security/2010/dsa-2135
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2135
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
27
reference_url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
28
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
29
reference_url http://www.redhat.com/support/errata/RHSA-2010-0749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0749.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2010-0751.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0751.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2010-0752.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0752.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2010-0753.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0753.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
34
reference_url http://www.securityfocus.com/bid/43841
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43841
35
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
36
reference_url http://www.vupen.com/english/advisories/2010/2897
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2897
37
reference_url http://www.vupen.com/english/advisories/2010/3097
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3097
38
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=638960
reference_id 638960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=638960
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3704
reference_id CVE-2010-3704
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3704
117
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
118
reference_url https://security.gentoo.org/glsa/201402-17
reference_id GLSA-201402-17
reference_type
scores
url https://security.gentoo.org/glsa/201402-17
119
reference_url https://access.redhat.com/errata/RHSA-2010:0749
reference_id RHSA-2010:0749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0749
120
reference_url https://access.redhat.com/errata/RHSA-2010:0751
reference_id RHSA-2010:0751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0751
121
reference_url https://access.redhat.com/errata/RHSA-2010:0752
reference_id RHSA-2010:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0752
122
reference_url https://access.redhat.com/errata/RHSA-2010:0753
reference_id RHSA-2010:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0753
123
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
124
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
125
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2010-3704
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4128-ep6n-hufz
2
url VCID-4yej-ag45-uuga
vulnerability_id VCID-4yej-ag45-uuga
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3703
reference_id
reference_type
scores
0
value 0.01118
scoring_system epss
scoring_elements 0.78249
published_at 2026-04-21T12:55:00Z
1
value 0.01118
scoring_system epss
scoring_elements 0.78164
published_at 2026-04-01T12:55:00Z
2
value 0.01118
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-02T12:55:00Z
3
value 0.01118
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-04T12:55:00Z
4
value 0.01118
scoring_system epss
scoring_elements 0.78185
published_at 2026-04-07T12:55:00Z
5
value 0.01118
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-08T12:55:00Z
6
value 0.01118
scoring_system epss
scoring_elements 0.78217
published_at 2026-04-09T12:55:00Z
7
value 0.01118
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-11T12:55:00Z
8
value 0.01118
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-12T12:55:00Z
9
value 0.01118
scoring_system epss
scoring_elements 0.78222
published_at 2026-04-13T12:55:00Z
10
value 0.01118
scoring_system epss
scoring_elements 0.78254
published_at 2026-04-16T12:55:00Z
11
value 0.01118
scoring_system epss
scoring_elements 0.78252
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3703
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703
8
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
9
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
12
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
13
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=639356
reference_id 639356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=639356
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3703
reference_id CVE-2010-3703
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3703
52
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
53
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
54
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2010-3703
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yej-ag45-uuga
3
url VCID-5r8r-hhhf-e3as
vulnerability_id VCID-5r8r-hhhf-e3as
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0165
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82526
published_at 2026-04-01T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-02T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-04T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82551
published_at 2026-04-07T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.82577
published_at 2026-04-08T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-09T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82603
published_at 2026-04-11T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-12T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.8259
published_at 2026-04-13T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-16T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82627
published_at 2026-04-18T12:55:00Z
11
value 0.01757
scoring_system epss
scoring_elements 0.82631
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0165
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
3
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
4
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0165
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5r8r-hhhf-e3as
4
url VCID-65sa-tagy-3ybs
vulnerability_id VCID-65sa-tagy-3ybs
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76549
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76577
published_at 2026-04-04T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76558
published_at 2026-04-07T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.7659
published_at 2026-04-08T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76601
published_at 2026-04-09T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-11T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76607
published_at 2026-04-12T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-13T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76639
published_at 2026-04-16T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-18T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.76631
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495886
reference_id 495886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495886
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0799
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs
5
url VCID-6789-dh3f-rudp
vulnerability_id VCID-6789-dh3f-rudp
summary zxpdf in xpdf before 3.02-19 as packaged in Debian unstable and 3.02-12+squeeze1 as packaged in Debian squeeze deletes temporary files insecurely, which allows remote attackers to delete arbitrary files via a crafted .pdf.gz file name.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2902
reference_id
reference_type
scores
0
value 0.00587
scoring_system epss
scoring_elements 0.69024
published_at 2026-04-01T12:55:00Z
1
value 0.00587
scoring_system epss
scoring_elements 0.6904
published_at 2026-04-02T12:55:00Z
2
value 0.00587
scoring_system epss
scoring_elements 0.69061
published_at 2026-04-04T12:55:00Z
3
value 0.00587
scoring_system epss
scoring_elements 0.69041
published_at 2026-04-07T12:55:00Z
4
value 0.00587
scoring_system epss
scoring_elements 0.69091
published_at 2026-04-08T12:55:00Z
5
value 0.00587
scoring_system epss
scoring_elements 0.6911
published_at 2026-04-09T12:55:00Z
6
value 0.00587
scoring_system epss
scoring_elements 0.69133
published_at 2026-04-11T12:55:00Z
7
value 0.00587
scoring_system epss
scoring_elements 0.69118
published_at 2026-04-12T12:55:00Z
8
value 0.00587
scoring_system epss
scoring_elements 0.69089
published_at 2026-04-13T12:55:00Z
9
value 0.00587
scoring_system epss
scoring_elements 0.69128
published_at 2026-04-16T12:55:00Z
10
value 0.00587
scoring_system epss
scoring_elements 0.69138
published_at 2026-04-18T12:55:00Z
11
value 0.00587
scoring_system epss
scoring_elements 0.69117
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2902
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2902
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635849
reference_id 635849
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635849
fixed_packages
0
url pkg:deb/debian/xpdf@3.03-10
purl pkg:deb/debian/xpdf@3.03-10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.03-10
aliases CVE-2011-2902
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6789-dh3f-rudp
6
url VCID-68rw-a4ah-5khm
vulnerability_id VCID-68rw-a4ah-5khm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
reference_id
reference_type
scores
0
value 0.07101
scoring_system epss
scoring_elements 0.91487
published_at 2026-04-01T12:55:00Z
1
value 0.07101
scoring_system epss
scoring_elements 0.91493
published_at 2026-04-02T12:55:00Z
2
value 0.07101
scoring_system epss
scoring_elements 0.915
published_at 2026-04-04T12:55:00Z
3
value 0.07101
scoring_system epss
scoring_elements 0.91508
published_at 2026-04-07T12:55:00Z
4
value 0.07101
scoring_system epss
scoring_elements 0.91521
published_at 2026-04-08T12:55:00Z
5
value 0.07101
scoring_system epss
scoring_elements 0.91527
published_at 2026-04-09T12:55:00Z
6
value 0.07101
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-11T12:55:00Z
7
value 0.07101
scoring_system epss
scoring_elements 0.91533
published_at 2026-04-12T12:55:00Z
8
value 0.07101
scoring_system epss
scoring_elements 0.91531
published_at 2026-04-13T12:55:00Z
9
value 0.07101
scoring_system epss
scoring_elements 0.91554
published_at 2026-04-16T12:55:00Z
10
value 0.07101
scoring_system epss
scoring_elements 0.91549
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495896
reference_id 495896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495896
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1182
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm
7
url VCID-6dwz-8kx9-rugr
vulnerability_id VCID-6dwz-8kx9-rugr
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3603
reference_id
reference_type
scores
0
value 0.06276
scoring_system epss
scoring_elements 0.90877
published_at 2026-04-01T12:55:00Z
1
value 0.06276
scoring_system epss
scoring_elements 0.90882
published_at 2026-04-02T12:55:00Z
2
value 0.06276
scoring_system epss
scoring_elements 0.90892
published_at 2026-04-04T12:55:00Z
3
value 0.06276
scoring_system epss
scoring_elements 0.90902
published_at 2026-04-07T12:55:00Z
4
value 0.06276
scoring_system epss
scoring_elements 0.90913
published_at 2026-04-08T12:55:00Z
5
value 0.06276
scoring_system epss
scoring_elements 0.9092
published_at 2026-04-09T12:55:00Z
6
value 0.06276
scoring_system epss
scoring_elements 0.90928
published_at 2026-04-13T12:55:00Z
7
value 0.06276
scoring_system epss
scoring_elements 0.90929
published_at 2026-04-12T12:55:00Z
8
value 0.06276
scoring_system epss
scoring_elements 0.90952
published_at 2026-04-16T12:55:00Z
9
value 0.06276
scoring_system epss
scoring_elements 0.9095
published_at 2026-04-18T12:55:00Z
10
value 0.06276
scoring_system epss
scoring_elements 0.90951
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526915
reference_id 526915
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526915
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
8
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
9
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3603
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwz-8kx9-rugr
8
url VCID-byr3-7wgc-jye9
vulnerability_id VCID-byr3-7wgc-jye9
summary
Multiple vulnerabilities have been discovered in T1Lib, the worst
    of which could lead to remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1554.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1554.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1554
reference_id
reference_type
scores
0
value 0.06576
scoring_system epss
scoring_elements 0.91179
published_at 2026-04-21T12:55:00Z
1
value 0.06576
scoring_system epss
scoring_elements 0.91102
published_at 2026-04-01T12:55:00Z
2
value 0.06576
scoring_system epss
scoring_elements 0.91108
published_at 2026-04-02T12:55:00Z
3
value 0.06576
scoring_system epss
scoring_elements 0.91116
published_at 2026-04-04T12:55:00Z
4
value 0.06576
scoring_system epss
scoring_elements 0.91124
published_at 2026-04-07T12:55:00Z
5
value 0.06576
scoring_system epss
scoring_elements 0.91137
published_at 2026-04-08T12:55:00Z
6
value 0.06576
scoring_system epss
scoring_elements 0.91143
published_at 2026-04-09T12:55:00Z
7
value 0.06576
scoring_system epss
scoring_elements 0.9115
published_at 2026-04-11T12:55:00Z
8
value 0.06576
scoring_system epss
scoring_elements 0.91152
published_at 2026-04-12T12:55:00Z
9
value 0.06576
scoring_system epss
scoring_elements 0.91151
published_at 2026-04-13T12:55:00Z
10
value 0.06576
scoring_system epss
scoring_elements 0.91176
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1554
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554
4
reference_url http://secunia.com/advisories/43823
reference_id
reference_type
scores
url http://secunia.com/advisories/43823
5
reference_url http://secunia.com/advisories/48985
reference_id
reference_type
scores
url http://secunia.com/advisories/48985
6
reference_url http://securityreason.com/securityalert/8171
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8171
7
reference_url http://securitytracker.com/id?1025266
reference_id
reference_type
scores
url http://securitytracker.com/id?1025266
8
reference_url http://www.foolabs.com/xpdf/download.html
reference_id
reference_type
scores
url http://www.foolabs.com/xpdf/download.html
9
reference_url http://www.kb.cert.org/vuls/id/376500
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/376500
10
reference_url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
12
reference_url http://www.securityfocus.com/archive/1/517205/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517205/100/0/threaded
13
reference_url http://www.toucan-system.com/advisories/tssa-2011-01.txt
reference_id
reference_type
scores
url http://www.toucan-system.com/advisories/tssa-2011-01.txt
14
reference_url http://www.vupen.com/english/advisories/2011/0728
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0728
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692856
reference_id 692856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692856
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1554
reference_id CVE-2011-1554
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1554
81
reference_url https://security.gentoo.org/glsa/201701-57
reference_id GLSA-201701-57
reference_type
scores
url https://security.gentoo.org/glsa/201701-57
82
reference_url https://access.redhat.com/errata/RHSA-2012:0062
reference_id RHSA-2012:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0062
83
reference_url https://access.redhat.com/errata/RHSA-2012:0137
reference_id RHSA-2012:0137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0137
84
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
85
reference_url https://usn.ubuntu.com/1335-1/
reference_id USN-1335-1
reference_type
scores
url https://usn.ubuntu.com/1335-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2011-1554
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byr3-7wgc-jye9
9
url VCID-ctb2-8h4y-vybd
vulnerability_id VCID-ctb2-8h4y-vybd
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
reference_id
reference_type
scores
0
value 0.0519
scoring_system epss
scoring_elements 0.8988
published_at 2026-04-01T12:55:00Z
1
value 0.0519
scoring_system epss
scoring_elements 0.89883
published_at 2026-04-02T12:55:00Z
2
value 0.0519
scoring_system epss
scoring_elements 0.89895
published_at 2026-04-04T12:55:00Z
3
value 0.0519
scoring_system epss
scoring_elements 0.899
published_at 2026-04-07T12:55:00Z
4
value 0.0519
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-08T12:55:00Z
5
value 0.0519
scoring_system epss
scoring_elements 0.89922
published_at 2026-04-09T12:55:00Z
6
value 0.0519
scoring_system epss
scoring_elements 0.89929
published_at 2026-04-11T12:55:00Z
7
value 0.0519
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-12T12:55:00Z
8
value 0.0519
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-13T12:55:00Z
9
value 0.0519
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-16T12:55:00Z
10
value 0.0519
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-18T12:55:00Z
11
value 0.0519
scoring_system epss
scoring_elements 0.89931
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490625
reference_id 490625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490625
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0166
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd
10
url VCID-ctdw-25y5-8kdm
vulnerability_id VCID-ctdw-25y5-8kdm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
reference_id
reference_type
scores
0
value 0.09017
scoring_system epss
scoring_elements 0.92595
published_at 2026-04-01T12:55:00Z
1
value 0.09017
scoring_system epss
scoring_elements 0.92601
published_at 2026-04-02T12:55:00Z
2
value 0.09017
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-04T12:55:00Z
3
value 0.09017
scoring_system epss
scoring_elements 0.92608
published_at 2026-04-07T12:55:00Z
4
value 0.09017
scoring_system epss
scoring_elements 0.92619
published_at 2026-04-08T12:55:00Z
5
value 0.09017
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-09T12:55:00Z
6
value 0.09017
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-13T12:55:00Z
7
value 0.09017
scoring_system epss
scoring_elements 0.92642
published_at 2026-04-16T12:55:00Z
8
value 0.09017
scoring_system epss
scoring_elements 0.92641
published_at 2026-04-18T12:55:00Z
9
value 0.09017
scoring_system epss
scoring_elements 0.92645
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
6
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
7
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
8
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
9
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
10
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
11
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
12
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
13
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0195
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm
11
url VCID-dgb8-nes9-8fb7
vulnerability_id VCID-dgb8-nes9-8fb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
reference_id
reference_type
scores
0
value 0.02384
scoring_system epss
scoring_elements 0.84926
published_at 2026-04-01T12:55:00Z
1
value 0.02384
scoring_system epss
scoring_elements 0.8494
published_at 2026-04-02T12:55:00Z
2
value 0.02384
scoring_system epss
scoring_elements 0.84959
published_at 2026-04-04T12:55:00Z
3
value 0.02384
scoring_system epss
scoring_elements 0.84963
published_at 2026-04-07T12:55:00Z
4
value 0.02384
scoring_system epss
scoring_elements 0.84986
published_at 2026-04-08T12:55:00Z
5
value 0.02384
scoring_system epss
scoring_elements 0.84993
published_at 2026-04-09T12:55:00Z
6
value 0.02384
scoring_system epss
scoring_elements 0.85008
published_at 2026-04-11T12:55:00Z
7
value 0.02384
scoring_system epss
scoring_elements 0.85006
published_at 2026-04-12T12:55:00Z
8
value 0.02384
scoring_system epss
scoring_elements 0.85003
published_at 2026-04-13T12:55:00Z
9
value 0.02384
scoring_system epss
scoring_elements 0.85024
published_at 2026-04-16T12:55:00Z
10
value 0.02384
scoring_system epss
scoring_elements 0.85026
published_at 2026-04-18T12:55:00Z
11
value 0.02384
scoring_system epss
scoring_elements 0.85023
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490614
reference_id 490614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490614
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7
12
url VCID-dn3b-smm9-63eb
vulnerability_id VCID-dn3b-smm9-63eb
summary
Poppler does not handle fonts inside PDF files safely, allowing for
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1693.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1693
reference_id
reference_type
scores
0
value 0.07598
scoring_system epss
scoring_elements 0.9181
published_at 2026-04-01T12:55:00Z
1
value 0.07598
scoring_system epss
scoring_elements 0.91818
published_at 2026-04-02T12:55:00Z
2
value 0.07598
scoring_system epss
scoring_elements 0.91824
published_at 2026-04-04T12:55:00Z
3
value 0.07598
scoring_system epss
scoring_elements 0.91832
published_at 2026-04-07T12:55:00Z
4
value 0.07598
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-08T12:55:00Z
5
value 0.07598
scoring_system epss
scoring_elements 0.9185
published_at 2026-04-09T12:55:00Z
6
value 0.07598
scoring_system epss
scoring_elements 0.91854
published_at 2026-04-11T12:55:00Z
7
value 0.07598
scoring_system epss
scoring_elements 0.91855
published_at 2026-04-12T12:55:00Z
8
value 0.07598
scoring_system epss
scoring_elements 0.91851
published_at 2026-04-13T12:55:00Z
9
value 0.07598
scoring_system epss
scoring_elements 0.91871
published_at 2026-04-16T12:55:00Z
10
value 0.07598
scoring_system epss
scoring_elements 0.91867
published_at 2026-04-18T12:55:00Z
11
value 0.07598
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=441722
reference_id 441722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=441722
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476842
reference_id 476842
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476842
5
reference_url https://security.gentoo.org/glsa/200804-18
reference_id GLSA-200804-18
reference_type
scores
url https://security.gentoo.org/glsa/200804-18
6
reference_url https://access.redhat.com/errata/RHSA-2008:0238
reference_id RHSA-2008:0238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0238
7
reference_url https://access.redhat.com/errata/RHSA-2008:0239
reference_id RHSA-2008:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0239
8
reference_url https://access.redhat.com/errata/RHSA-2008:0240
reference_id RHSA-2008:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0240
9
reference_url https://access.redhat.com/errata/RHSA-2008:0262
reference_id RHSA-2008:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0262
10
reference_url https://usn.ubuntu.com/603-1/
reference_id USN-603-1
reference_type
scores
url https://usn.ubuntu.com/603-1/
11
reference_url https://usn.ubuntu.com/603-2/
reference_id USN-603-2
reference_type
scores
url https://usn.ubuntu.com/603-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2008-1693
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn3b-smm9-63eb
13
url VCID-fct6-695j-t7bs
vulnerability_id VCID-fct6-695j-t7bs
summary
PDFKit and ImageKits are vulnerable to an integer overflow and a stack
    overflow allowing for the user-assisted execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3387
reference_id
reference_type
scores
0
value 0.08892
scoring_system epss
scoring_elements 0.92529
published_at 2026-04-01T12:55:00Z
1
value 0.08892
scoring_system epss
scoring_elements 0.92534
published_at 2026-04-02T12:55:00Z
2
value 0.08892
scoring_system epss
scoring_elements 0.92541
published_at 2026-04-04T12:55:00Z
3
value 0.08892
scoring_system epss
scoring_elements 0.92544
published_at 2026-04-07T12:55:00Z
4
value 0.08892
scoring_system epss
scoring_elements 0.92554
published_at 2026-04-08T12:55:00Z
5
value 0.08892
scoring_system epss
scoring_elements 0.92559
published_at 2026-04-09T12:55:00Z
6
value 0.08892
scoring_system epss
scoring_elements 0.92565
published_at 2026-04-13T12:55:00Z
7
value 0.08892
scoring_system epss
scoring_elements 0.92566
published_at 2026-04-12T12:55:00Z
8
value 0.08892
scoring_system epss
scoring_elements 0.92577
published_at 2026-04-16T12:55:00Z
9
value 0.08892
scoring_system epss
scoring_elements 0.92576
published_at 2026-04-18T12:55:00Z
10
value 0.08892
scoring_system epss
scoring_elements 0.92579
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3387
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=248194
reference_id 248194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=248194
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460
reference_id 435460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462
reference_id 435462
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462
6
reference_url https://security.gentoo.org/glsa/200709-12
reference_id GLSA-200709-12
reference_type
scores
url https://security.gentoo.org/glsa/200709-12
7
reference_url https://security.gentoo.org/glsa/200709-17
reference_id GLSA-200709-17
reference_type
scores
url https://security.gentoo.org/glsa/200709-17
8
reference_url https://security.gentoo.org/glsa/200710-08
reference_id GLSA-200710-08
reference_type
scores
url https://security.gentoo.org/glsa/200710-08
9
reference_url https://security.gentoo.org/glsa/200710-20
reference_id GLSA-200710-20
reference_type
scores
url https://security.gentoo.org/glsa/200710-20
10
reference_url https://access.redhat.com/errata/RHSA-2007:0720
reference_id RHSA-2007:0720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0720
11
reference_url https://access.redhat.com/errata/RHSA-2007:0729
reference_id RHSA-2007:0729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0729
12
reference_url https://access.redhat.com/errata/RHSA-2007:0730
reference_id RHSA-2007:0730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0730
13
reference_url https://access.redhat.com/errata/RHSA-2007:0731
reference_id RHSA-2007:0731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0731
14
reference_url https://access.redhat.com/errata/RHSA-2007:0732
reference_id RHSA-2007:0732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0732
15
reference_url https://access.redhat.com/errata/RHSA-2007:0735
reference_id RHSA-2007:0735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0735
16
reference_url https://usn.ubuntu.com/496-1/
reference_id USN-496-1
reference_type
scores
url https://usn.ubuntu.com/496-1/
17
reference_url https://usn.ubuntu.com/496-2/
reference_id USN-496-2
reference_type
scores
url https://usn.ubuntu.com/496-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-3387
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fct6-695j-t7bs
14
url VCID-gbm8-vcwy-u3g2
vulnerability_id VCID-gbm8-vcwy-u3g2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
reference_id
reference_type
scores
0
value 0.27841
scoring_system epss
scoring_elements 0.96426
published_at 2026-04-01T12:55:00Z
1
value 0.27841
scoring_system epss
scoring_elements 0.96433
published_at 2026-04-02T12:55:00Z
2
value 0.27841
scoring_system epss
scoring_elements 0.96437
published_at 2026-04-04T12:55:00Z
3
value 0.27841
scoring_system epss
scoring_elements 0.9644
published_at 2026-04-07T12:55:00Z
4
value 0.27841
scoring_system epss
scoring_elements 0.96449
published_at 2026-04-08T12:55:00Z
5
value 0.27841
scoring_system epss
scoring_elements 0.96452
published_at 2026-04-09T12:55:00Z
6
value 0.27841
scoring_system epss
scoring_elements 0.96456
published_at 2026-04-11T12:55:00Z
7
value 0.27841
scoring_system epss
scoring_elements 0.96457
published_at 2026-04-12T12:55:00Z
8
value 0.27841
scoring_system epss
scoring_elements 0.96459
published_at 2026-04-13T12:55:00Z
9
value 0.27841
scoring_system epss
scoring_elements 0.96466
published_at 2026-04-16T12:55:00Z
10
value 0.27841
scoring_system epss
scoring_elements 0.9647
published_at 2026-04-18T12:55:00Z
11
value 0.27841
scoring_system epss
scoring_elements 0.96473
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495889
reference_id 495889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495889
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1179
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2
15
url VCID-gc6w-tctk-nycd
vulnerability_id VCID-gc6w-tctk-nycd
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json
1
reference_url https://access.redhat.com/security/cve/cve-2010-4653
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2010-4653
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4653
reference_id
reference_type
scores
0
value 0.00782
scoring_system epss
scoring_elements 0.73766
published_at 2026-04-21T12:55:00Z
1
value 0.00782
scoring_system epss
scoring_elements 0.73775
published_at 2026-04-18T12:55:00Z
2
value 0.00782
scoring_system epss
scoring_elements 0.73677
published_at 2026-04-01T12:55:00Z
3
value 0.00782
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-02T12:55:00Z
4
value 0.00782
scoring_system epss
scoring_elements 0.73709
published_at 2026-04-04T12:55:00Z
5
value 0.00782
scoring_system epss
scoring_elements 0.73682
published_at 2026-04-07T12:55:00Z
6
value 0.00782
scoring_system epss
scoring_elements 0.73717
published_at 2026-04-08T12:55:00Z
7
value 0.00782
scoring_system epss
scoring_elements 0.73729
published_at 2026-04-09T12:55:00Z
8
value 0.00782
scoring_system epss
scoring_elements 0.73751
published_at 2026-04-11T12:55:00Z
9
value 0.00782
scoring_system epss
scoring_elements 0.73733
published_at 2026-04-12T12:55:00Z
10
value 0.00782
scoring_system epss
scoring_elements 0.73724
published_at 2026-04-13T12:55:00Z
11
value 0.00782
scoring_system epss
scoring_elements 0.73767
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4653
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653
5
reference_url http://security.gentoo.org/glsa/glsa-201310-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201310-03.xml
6
reference_url https://security-tracker.debian.org/tracker/CVE-2010-4653
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2010-4653
7
reference_url http://www.securityfocus.com/bid/45948
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45948
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672165
reference_id 672165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672165
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4653
reference_id CVE-2010-4653
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-4653
14
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2010-4653
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gc6w-tctk-nycd
16
url VCID-jvuz-2phs-87du
vulnerability_id VCID-jvuz-2phs-87du
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
reference_id
reference_type
scores
0
value 0.08831
scoring_system epss
scoring_elements 0.92498
published_at 2026-04-01T12:55:00Z
1
value 0.08831
scoring_system epss
scoring_elements 0.92504
published_at 2026-04-02T12:55:00Z
2
value 0.08831
scoring_system epss
scoring_elements 0.92512
published_at 2026-04-04T12:55:00Z
3
value 0.08831
scoring_system epss
scoring_elements 0.92514
published_at 2026-04-07T12:55:00Z
4
value 0.08831
scoring_system epss
scoring_elements 0.92526
published_at 2026-04-08T12:55:00Z
5
value 0.08831
scoring_system epss
scoring_elements 0.9253
published_at 2026-04-09T12:55:00Z
6
value 0.08831
scoring_system epss
scoring_elements 0.92537
published_at 2026-04-13T12:55:00Z
7
value 0.08831
scoring_system epss
scoring_elements 0.92538
published_at 2026-04-12T12:55:00Z
8
value 0.08831
scoring_system epss
scoring_elements 0.92547
published_at 2026-04-18T12:55:00Z
9
value 0.08831
scoring_system epss
scoring_elements 0.92549
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495892
reference_id 495892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495892
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1180
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du
17
url VCID-kgk7-hqby-wkez
vulnerability_id VCID-kgk7-hqby-wkez
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4352
reference_id
reference_type
scores
0
value 0.25469
scoring_system epss
scoring_elements 0.9618
published_at 2026-04-01T12:55:00Z
1
value 0.25469
scoring_system epss
scoring_elements 0.96188
published_at 2026-04-02T12:55:00Z
2
value 0.25469
scoring_system epss
scoring_elements 0.96196
published_at 2026-04-04T12:55:00Z
3
value 0.25469
scoring_system epss
scoring_elements 0.96199
published_at 2026-04-07T12:55:00Z
4
value 0.25469
scoring_system epss
scoring_elements 0.96209
published_at 2026-04-08T12:55:00Z
5
value 0.25469
scoring_system epss
scoring_elements 0.96212
published_at 2026-04-09T12:55:00Z
6
value 0.25469
scoring_system epss
scoring_elements 0.96217
published_at 2026-04-11T12:55:00Z
7
value 0.25469
scoring_system epss
scoring_elements 0.96216
published_at 2026-04-12T12:55:00Z
8
value 0.25469
scoring_system epss
scoring_elements 0.96218
published_at 2026-04-13T12:55:00Z
9
value 0.25469
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-16T12:55:00Z
10
value 0.25469
scoring_system epss
scoring_elements 0.96231
published_at 2026-04-18T12:55:00Z
11
value 0.25469
scoring_system epss
scoring_elements 0.96232
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4352
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345101
reference_id 345101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345101
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
10
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
11
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
12
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
13
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
14
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
15
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
16
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-4352
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgk7-hqby-wkez
18
url VCID-mq43-5wd8-ayan
vulnerability_id VCID-mq43-5wd8-ayan
summary xpdf infinite loop DoS
references
0
reference_url http://docs.info.apple.com/article.html?artnum=305214
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=305214
1
reference_url http://projects.info-pull.com/moab/MOAB-06-01-2007.html
reference_id
reference_type
scores
url http://projects.info-pull.com/moab/MOAB-06-01-2007.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0104.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0104.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0104
reference_id
reference_type
scores
0
value 0.19012
scoring_system epss
scoring_elements 0.95338
published_at 2026-04-21T12:55:00Z
1
value 0.19012
scoring_system epss
scoring_elements 0.95284
published_at 2026-04-01T12:55:00Z
2
value 0.19012
scoring_system epss
scoring_elements 0.95296
published_at 2026-04-02T12:55:00Z
3
value 0.19012
scoring_system epss
scoring_elements 0.95301
published_at 2026-04-04T12:55:00Z
4
value 0.19012
scoring_system epss
scoring_elements 0.95307
published_at 2026-04-07T12:55:00Z
5
value 0.19012
scoring_system epss
scoring_elements 0.95314
published_at 2026-04-08T12:55:00Z
6
value 0.19012
scoring_system epss
scoring_elements 0.95317
published_at 2026-04-09T12:55:00Z
7
value 0.19012
scoring_system epss
scoring_elements 0.95322
published_at 2026-04-12T12:55:00Z
8
value 0.19012
scoring_system epss
scoring_elements 0.95324
published_at 2026-04-13T12:55:00Z
9
value 0.19012
scoring_system epss
scoring_elements 0.95331
published_at 2026-04-16T12:55:00Z
10
value 0.19012
scoring_system epss
scoring_elements 0.95335
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0104
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104
5
reference_url http://secunia.com/advisories/23791
reference_id
reference_type
scores
url http://secunia.com/advisories/23791
6
reference_url http://secunia.com/advisories/23799
reference_id
reference_type
scores
url http://secunia.com/advisories/23799
7
reference_url http://secunia.com/advisories/23808
reference_id
reference_type
scores
url http://secunia.com/advisories/23808
8
reference_url http://secunia.com/advisories/23813
reference_id
reference_type
scores
url http://secunia.com/advisories/23813
9
reference_url http://secunia.com/advisories/23815
reference_id
reference_type
scores
url http://secunia.com/advisories/23815
10
reference_url http://secunia.com/advisories/23839
reference_id
reference_type
scores
url http://secunia.com/advisories/23839
11
reference_url http://secunia.com/advisories/23844
reference_id
reference_type
scores
url http://secunia.com/advisories/23844
12
reference_url http://secunia.com/advisories/23876
reference_id
reference_type
scores
url http://secunia.com/advisories/23876
13
reference_url http://secunia.com/advisories/24204
reference_id
reference_type
scores
url http://secunia.com/advisories/24204
14
reference_url http://secunia.com/advisories/24479
reference_id
reference_type
scores
url http://secunia.com/advisories/24479
15
reference_url http://securitytracker.com/id?1017514
reference_id
reference_type
scores
url http://securitytracker.com/id?1017514
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31364
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31364
17
reference_url https://issues.rpath.com/browse/RPL-964
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-964
18
reference_url http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html
reference_id
reference_type
scores
url http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html
19
reference_url http://www.kde.org/info/security/advisory-20070115-1.txt
reference_id
reference_type
scores
url http://www.kde.org/info/security/advisory-20070115-1.txt
20
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:018
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:018
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:019
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:019
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:020
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:020
23
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:021
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:021
24
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:022
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:022
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:024
26
reference_url http://www.novell.com/linux/security/advisories/2007_3_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_3_sr.html
27
reference_url http://www.securityfocus.com/archive/1/457055/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/457055/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/21910
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21910
29
reference_url http://www.securitytracker.com/id?1017749
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017749
30
reference_url http://www.ubuntu.com/usn/usn-410-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-410-1
31
reference_url http://www.ubuntu.com/usn/usn-410-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-410-2
32
reference_url http://www.us-cert.gov/cas/techalerts/TA07-072A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-072A.html
33
reference_url http://www.vupen.com/english/advisories/2007/0203
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0203
34
reference_url http://www.vupen.com/english/advisories/2007/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0212
35
reference_url http://www.vupen.com/english/advisories/2007/0244
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0244
36
reference_url http://www.vupen.com/english/advisories/2007/0930
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0930
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852
reference_id 406852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=428126
reference_id 428126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=428126
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0104
reference_id CVE-2007-0104
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0104
57
reference_url https://usn.ubuntu.com/410-1/
reference_id USN-410-1
reference_type
scores
url https://usn.ubuntu.com/410-1/
58
reference_url https://usn.ubuntu.com/410-2/
reference_id USN-410-2
reference_type
scores
url https://usn.ubuntu.com/410-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-0104
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mq43-5wd8-ayan
19
url VCID-neqs-cg1p-7bb7
vulnerability_id VCID-neqs-cg1p-7bb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3702
reference_id
reference_type
scores
0
value 0.02916
scoring_system epss
scoring_elements 0.86395
published_at 2026-04-21T12:55:00Z
1
value 0.02916
scoring_system epss
scoring_elements 0.86316
published_at 2026-04-01T12:55:00Z
2
value 0.02916
scoring_system epss
scoring_elements 0.86326
published_at 2026-04-02T12:55:00Z
3
value 0.02916
scoring_system epss
scoring_elements 0.86345
published_at 2026-04-04T12:55:00Z
4
value 0.02916
scoring_system epss
scoring_elements 0.86346
published_at 2026-04-07T12:55:00Z
5
value 0.02916
scoring_system epss
scoring_elements 0.86364
published_at 2026-04-08T12:55:00Z
6
value 0.02916
scoring_system epss
scoring_elements 0.86374
published_at 2026-04-09T12:55:00Z
7
value 0.02916
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-11T12:55:00Z
8
value 0.02916
scoring_system epss
scoring_elements 0.86385
published_at 2026-04-12T12:55:00Z
9
value 0.02916
scoring_system epss
scoring_elements 0.8638
published_at 2026-04-13T12:55:00Z
10
value 0.02916
scoring_system epss
scoring_elements 0.86397
published_at 2026-04-16T12:55:00Z
11
value 0.02916
scoring_system epss
scoring_elements 0.86402
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3702
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
15
reference_url http://secunia.com/advisories/42141
reference_id
reference_type
scores
url http://secunia.com/advisories/42141
16
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
17
reference_url http://secunia.com/advisories/42397
reference_id
reference_type
scores
url http://secunia.com/advisories/42397
18
reference_url http://secunia.com/advisories/42691
reference_id
reference_type
scores
url http://secunia.com/advisories/42691
19
reference_url http://secunia.com/advisories/43079
reference_id
reference_type
scores
url http://secunia.com/advisories/43079
20
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
21
reference_url http://www.debian.org/security/2010/dsa-2119
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2119
22
reference_url http://www.debian.org/security/2010/dsa-2135
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2135
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
28
reference_url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
29
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
30
reference_url http://www.redhat.com/support/errata/RHSA-2010-0749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0749.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2010-0750.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0750.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2010-0751.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0751.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2010-0752.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0752.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2010-0753.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0753.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2010-0754.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0754.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2010-0755.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0755.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
38
reference_url http://www.securityfocus.com/bid/43845
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43845
39
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
40
reference_url http://www.vupen.com/english/advisories/2010/2897
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2897
41
reference_url http://www.vupen.com/english/advisories/2010/3097
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3097
42
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=595245
reference_id 595245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=595245
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3702
reference_id CVE-2010-3702
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3702
75
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
76
reference_url https://security.gentoo.org/glsa/201402-17
reference_id GLSA-201402-17
reference_type
scores
url https://security.gentoo.org/glsa/201402-17
77
reference_url https://access.redhat.com/errata/RHSA-2010:0749
reference_id RHSA-2010:0749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0749
78
reference_url https://access.redhat.com/errata/RHSA-2010:0750
reference_id RHSA-2010:0750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0750
79
reference_url https://access.redhat.com/errata/RHSA-2010:0751
reference_id RHSA-2010:0751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0751
80
reference_url https://access.redhat.com/errata/RHSA-2010:0752
reference_id RHSA-2010:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0752
81
reference_url https://access.redhat.com/errata/RHSA-2010:0753
reference_id RHSA-2010:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0753
82
reference_url https://access.redhat.com/errata/RHSA-2010:0754
reference_id RHSA-2010:0754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0754
83
reference_url https://access.redhat.com/errata/RHSA-2010:0755
reference_id RHSA-2010:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0755
84
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
85
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
86
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2010-3702
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-neqs-cg1p-7bb7
20
url VCID-rm6a-c4rf-f7hc
vulnerability_id VCID-rm6a-c4rf-f7hc
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
reference_id
reference_type
scores
0
value 0.08985
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-01T12:55:00Z
1
value 0.08985
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-02T12:55:00Z
2
value 0.08985
scoring_system epss
scoring_elements 0.92587
published_at 2026-04-04T12:55:00Z
3
value 0.08985
scoring_system epss
scoring_elements 0.92588
published_at 2026-04-07T12:55:00Z
4
value 0.08985
scoring_system epss
scoring_elements 0.926
published_at 2026-04-08T12:55:00Z
5
value 0.08985
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-09T12:55:00Z
6
value 0.08985
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-13T12:55:00Z
7
value 0.08985
scoring_system epss
scoring_elements 0.92611
published_at 2026-04-12T12:55:00Z
8
value 0.08985
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-16T12:55:00Z
9
value 0.08985
scoring_system epss
scoring_elements 0.92623
published_at 2026-04-18T12:55:00Z
10
value 0.08985
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495887
reference_id 495887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495887
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0800
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc
21
url VCID-s66u-r7vs-bfdu
vulnerability_id VCID-s66u-r7vs-bfdu
summary
Multiple vulnerabilities have been discovered in T1Lib, the worst
    of which could lead to remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1553.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1553.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1553
reference_id
reference_type
scores
0
value 0.04953
scoring_system epss
scoring_elements 0.89664
published_at 2026-04-21T12:55:00Z
1
value 0.04953
scoring_system epss
scoring_elements 0.89616
published_at 2026-04-01T12:55:00Z
2
value 0.04953
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-02T12:55:00Z
3
value 0.04953
scoring_system epss
scoring_elements 0.89632
published_at 2026-04-04T12:55:00Z
4
value 0.04953
scoring_system epss
scoring_elements 0.89633
published_at 2026-04-07T12:55:00Z
5
value 0.04953
scoring_system epss
scoring_elements 0.8965
published_at 2026-04-08T12:55:00Z
6
value 0.04953
scoring_system epss
scoring_elements 0.89655
published_at 2026-04-09T12:55:00Z
7
value 0.04953
scoring_system epss
scoring_elements 0.89662
published_at 2026-04-11T12:55:00Z
8
value 0.04953
scoring_system epss
scoring_elements 0.89661
published_at 2026-04-12T12:55:00Z
9
value 0.04953
scoring_system epss
scoring_elements 0.89654
published_at 2026-04-13T12:55:00Z
10
value 0.04953
scoring_system epss
scoring_elements 0.89669
published_at 2026-04-16T12:55:00Z
11
value 0.04953
scoring_system epss
scoring_elements 0.8967
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1553
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553
4
reference_url http://secunia.com/advisories/43823
reference_id
reference_type
scores
url http://secunia.com/advisories/43823
5
reference_url http://secunia.com/advisories/48985
reference_id
reference_type
scores
url http://secunia.com/advisories/48985
6
reference_url http://securityreason.com/securityalert/8171
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8171
7
reference_url http://securitytracker.com/id?1025266
reference_id
reference_type
scores
url http://securitytracker.com/id?1025266
8
reference_url http://www.foolabs.com/xpdf/download.html
reference_id
reference_type
scores
url http://www.foolabs.com/xpdf/download.html
9
reference_url http://www.kb.cert.org/vuls/id/376500
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/376500
10
reference_url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
12
reference_url http://www.securityfocus.com/archive/1/517205/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517205/100/0/threaded
13
reference_url http://www.toucan-system.com/advisories/tssa-2011-01.txt
reference_id
reference_type
scores
url http://www.toucan-system.com/advisories/tssa-2011-01.txt
14
reference_url http://www.vupen.com/english/advisories/2011/0728
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0728
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692854
reference_id 692854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692854
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1553
reference_id CVE-2011-1553
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1553
81
reference_url https://security.gentoo.org/glsa/201701-57
reference_id GLSA-201701-57
reference_type
scores
url https://security.gentoo.org/glsa/201701-57
82
reference_url https://access.redhat.com/errata/RHSA-2012:0062
reference_id RHSA-2012:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0062
83
reference_url https://access.redhat.com/errata/RHSA-2012:0137
reference_id RHSA-2012:0137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0137
84
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
85
reference_url https://usn.ubuntu.com/1335-1/
reference_id USN-1335-1
reference_type
scores
url https://usn.ubuntu.com/1335-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2011-1553
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s66u-r7vs-bfdu
22
url VCID-sv3r-4tym-qua5
vulnerability_id VCID-sv3r-4tym-qua5
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5393
reference_id
reference_type
scores
0
value 0.14245
scoring_system epss
scoring_elements 0.94355
published_at 2026-04-01T12:55:00Z
1
value 0.14245
scoring_system epss
scoring_elements 0.94364
published_at 2026-04-02T12:55:00Z
2
value 0.14245
scoring_system epss
scoring_elements 0.94374
published_at 2026-04-04T12:55:00Z
3
value 0.14245
scoring_system epss
scoring_elements 0.94375
published_at 2026-04-07T12:55:00Z
4
value 0.14245
scoring_system epss
scoring_elements 0.94385
published_at 2026-04-08T12:55:00Z
5
value 0.14245
scoring_system epss
scoring_elements 0.94389
published_at 2026-04-09T12:55:00Z
6
value 0.14245
scoring_system epss
scoring_elements 0.94392
published_at 2026-04-11T12:55:00Z
7
value 0.14245
scoring_system epss
scoring_elements 0.94393
published_at 2026-04-12T12:55:00Z
8
value 0.14245
scoring_system epss
scoring_elements 0.94394
published_at 2026-04-13T12:55:00Z
9
value 0.14245
scoring_system epss
scoring_elements 0.94408
published_at 2026-04-16T12:55:00Z
10
value 0.14245
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-18T12:55:00Z
11
value 0.14245
scoring_system epss
scoring_elements 0.94417
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345121
reference_id 345121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345121
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1023
reference_id RHSA-2007:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1023
10
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
11
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
12
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
13
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
14
reference_url https://access.redhat.com/errata/RHSA-2007:1028
reference_id RHSA-2007:1028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1028
15
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
16
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
17
reference_url https://access.redhat.com/errata/RHSA-2007:1031
reference_id RHSA-2007:1031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1031
18
reference_url https://access.redhat.com/errata/RHSA-2007:1051
reference_id RHSA-2007:1051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1051
19
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
20
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-5393
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sv3r-4tym-qua5
23
url VCID-uczb-yext-6yfq
vulnerability_id VCID-uczb-yext-6yfq
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1188
reference_id
reference_type
scores
0
value 0.21975
scoring_system epss
scoring_elements 0.95736
published_at 2026-04-01T12:55:00Z
1
value 0.21975
scoring_system epss
scoring_elements 0.95745
published_at 2026-04-02T12:55:00Z
2
value 0.21975
scoring_system epss
scoring_elements 0.95753
published_at 2026-04-04T12:55:00Z
3
value 0.21975
scoring_system epss
scoring_elements 0.95755
published_at 2026-04-07T12:55:00Z
4
value 0.21975
scoring_system epss
scoring_elements 0.95764
published_at 2026-04-08T12:55:00Z
5
value 0.21975
scoring_system epss
scoring_elements 0.95767
published_at 2026-04-09T12:55:00Z
6
value 0.21975
scoring_system epss
scoring_elements 0.95771
published_at 2026-04-12T12:55:00Z
7
value 0.21975
scoring_system epss
scoring_elements 0.95772
published_at 2026-04-13T12:55:00Z
8
value 0.21975
scoring_system epss
scoring_elements 0.95781
published_at 2026-04-16T12:55:00Z
9
value 0.21975
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-18T12:55:00Z
10
value 0.21975
scoring_system epss
scoring_elements 0.95787
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1188
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495907
reference_id 495907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495907
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779
reference_id 575779
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-1188
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uczb-yext-6yfq
24
url VCID-uny2-k19n-1bb2
vulnerability_id VCID-uny2-k19n-1bb2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
reference_id
reference_type
scores
0
value 0.02433
scoring_system epss
scoring_elements 0.85086
published_at 2026-04-01T12:55:00Z
1
value 0.02433
scoring_system epss
scoring_elements 0.85098
published_at 2026-04-02T12:55:00Z
2
value 0.02433
scoring_system epss
scoring_elements 0.85116
published_at 2026-04-04T12:55:00Z
3
value 0.02433
scoring_system epss
scoring_elements 0.85119
published_at 2026-04-07T12:55:00Z
4
value 0.02433
scoring_system epss
scoring_elements 0.85141
published_at 2026-04-08T12:55:00Z
5
value 0.02433
scoring_system epss
scoring_elements 0.85148
published_at 2026-04-09T12:55:00Z
6
value 0.02433
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-11T12:55:00Z
7
value 0.02433
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-12T12:55:00Z
8
value 0.02433
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-13T12:55:00Z
9
value 0.02433
scoring_system epss
scoring_elements 0.85177
published_at 2026-04-21T12:55:00Z
10
value 0.02433
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495894
reference_id 495894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495894
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1181
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2
25
url VCID-upkc-66fh-wbby
vulnerability_id VCID-upkc-66fh-wbby
summary
Multiple vulnerabilities have been discovered in T1Lib, the worst
    of which could lead to remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0764.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0764.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0764
reference_id
reference_type
scores
0
value 0.31187
scoring_system epss
scoring_elements 0.96772
published_at 2026-04-21T12:55:00Z
1
value 0.31187
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-01T12:55:00Z
2
value 0.31187
scoring_system epss
scoring_elements 0.9674
published_at 2026-04-02T12:55:00Z
3
value 0.31187
scoring_system epss
scoring_elements 0.96741
published_at 2026-04-04T12:55:00Z
4
value 0.31187
scoring_system epss
scoring_elements 0.96745
published_at 2026-04-07T12:55:00Z
5
value 0.31187
scoring_system epss
scoring_elements 0.96753
published_at 2026-04-08T12:55:00Z
6
value 0.31187
scoring_system epss
scoring_elements 0.96754
published_at 2026-04-09T12:55:00Z
7
value 0.31187
scoring_system epss
scoring_elements 0.96757
published_at 2026-04-12T12:55:00Z
8
value 0.31187
scoring_system epss
scoring_elements 0.96759
published_at 2026-04-13T12:55:00Z
9
value 0.31187
scoring_system epss
scoring_elements 0.96765
published_at 2026-04-16T12:55:00Z
10
value 0.31187
scoring_system epss
scoring_elements 0.9677
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0764
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
4
reference_url http://secunia.com/advisories/43823
reference_id
reference_type
scores
url http://secunia.com/advisories/43823
5
reference_url http://secunia.com/advisories/47347
reference_id
reference_type
scores
url http://secunia.com/advisories/47347
6
reference_url http://secunia.com/advisories/48985
reference_id
reference_type
scores
url http://secunia.com/advisories/48985
7
reference_url http://securityreason.com/securityalert/8171
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8171
8
reference_url http://securitytracker.com/id?1025266
reference_id
reference_type
scores
url http://securitytracker.com/id?1025266
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66208
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66208
10
reference_url http://www.foolabs.com/xpdf/download.html
reference_id
reference_type
scores
url http://www.foolabs.com/xpdf/download.html
11
reference_url http://www.kb.cert.org/vuls/id/376500
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/376500
12
reference_url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:002
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:002
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
15
reference_url http://www.securityfocus.com/archive/1/517205/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517205/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/46941
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46941
17
reference_url http://www.toucan-system.com/advisories/tssa-2011-01.txt
reference_id
reference_type
scores
url http://www.toucan-system.com/advisories/tssa-2011-01.txt
18
reference_url http://www.ubuntu.com/usn/USN-1316-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1316-1
19
reference_url http://www.vupen.com/english/advisories/2011/0728
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0728
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692909
reference_id 692909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692909
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0764
reference_id CVE-2011-0764
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0764
86
reference_url https://security.gentoo.org/glsa/201701-57
reference_id GLSA-201701-57
reference_type
scores
url https://security.gentoo.org/glsa/201701-57
87
reference_url https://access.redhat.com/errata/RHSA-2012:0062
reference_id RHSA-2012:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0062
88
reference_url https://access.redhat.com/errata/RHSA-2012:0137
reference_id RHSA-2012:0137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0137
89
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
90
reference_url https://usn.ubuntu.com/1316-1/
reference_id USN-1316-1
reference_type
scores
url https://usn.ubuntu.com/1316-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2011-0764
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upkc-66fh-wbby
26
url VCID-vudr-8rrg-hufx
vulnerability_id VCID-vudr-8rrg-hufx
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
reference_id
reference_type
scores
0
value 0.01703
scoring_system epss
scoring_elements 0.82232
published_at 2026-04-01T12:55:00Z
1
value 0.01703
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-02T12:55:00Z
2
value 0.01703
scoring_system epss
scoring_elements 0.82264
published_at 2026-04-04T12:55:00Z
3
value 0.01703
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-07T12:55:00Z
4
value 0.01703
scoring_system epss
scoring_elements 0.82285
published_at 2026-04-08T12:55:00Z
5
value 0.01703
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-09T12:55:00Z
6
value 0.01703
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-11T12:55:00Z
7
value 0.01703
scoring_system epss
scoring_elements 0.82306
published_at 2026-04-12T12:55:00Z
8
value 0.01703
scoring_system epss
scoring_elements 0.823
published_at 2026-04-13T12:55:00Z
9
value 0.01703
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-18T12:55:00Z
10
value 0.01703
scoring_system epss
scoring_elements 0.82337
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495899
reference_id 495899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495899
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-1183
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx
27
url VCID-wpgs-8fw5-wbhe
vulnerability_id VCID-wpgs-8fw5-wbhe
summary
Poppler and various KDE components are vulnerable to multiple memory
    management issues possibly resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5392
reference_id
reference_type
scores
0
value 0.06567
scoring_system epss
scoring_elements 0.91095
published_at 2026-04-01T12:55:00Z
1
value 0.06567
scoring_system epss
scoring_elements 0.911
published_at 2026-04-02T12:55:00Z
2
value 0.06567
scoring_system epss
scoring_elements 0.91109
published_at 2026-04-04T12:55:00Z
3
value 0.06567
scoring_system epss
scoring_elements 0.91117
published_at 2026-04-07T12:55:00Z
4
value 0.06567
scoring_system epss
scoring_elements 0.91129
published_at 2026-04-08T12:55:00Z
5
value 0.06567
scoring_system epss
scoring_elements 0.91135
published_at 2026-04-09T12:55:00Z
6
value 0.06567
scoring_system epss
scoring_elements 0.91143
published_at 2026-04-11T12:55:00Z
7
value 0.06567
scoring_system epss
scoring_elements 0.91144
published_at 2026-04-13T12:55:00Z
8
value 0.06567
scoring_system epss
scoring_elements 0.91168
published_at 2026-04-18T12:55:00Z
9
value 0.06567
scoring_system epss
scoring_elements 0.91172
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=345111
reference_id 345111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=345111
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
reference_id 450628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
reference_id 450629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629
6
reference_url https://security.gentoo.org/glsa/200711-22
reference_id GLSA-200711-22
reference_type
scores
url https://security.gentoo.org/glsa/200711-22
7
reference_url https://access.redhat.com/errata/RHSA-2007:1021
reference_id RHSA-2007:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1021
8
reference_url https://access.redhat.com/errata/RHSA-2007:1022
reference_id RHSA-2007:1022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1022
9
reference_url https://access.redhat.com/errata/RHSA-2007:1024
reference_id RHSA-2007:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1024
10
reference_url https://access.redhat.com/errata/RHSA-2007:1025
reference_id RHSA-2007:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1025
11
reference_url https://access.redhat.com/errata/RHSA-2007:1026
reference_id RHSA-2007:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1026
12
reference_url https://access.redhat.com/errata/RHSA-2007:1027
reference_id RHSA-2007:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1027
13
reference_url https://access.redhat.com/errata/RHSA-2007:1029
reference_id RHSA-2007:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1029
14
reference_url https://access.redhat.com/errata/RHSA-2007:1030
reference_id RHSA-2007:1030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1030
15
reference_url https://usn.ubuntu.com/542-1/
reference_id USN-542-1
reference_type
scores
url https://usn.ubuntu.com/542-1/
16
reference_url https://usn.ubuntu.com/542-2/
reference_id USN-542-2
reference_type
scores
url https://usn.ubuntu.com/542-2/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2007-5392
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpgs-8fw5-wbhe
28
url VCID-xddx-numk-a7bn
vulnerability_id VCID-xddx-numk-a7bn
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3608
reference_id
reference_type
scores
0
value 0.12664
scoring_system epss
scoring_elements 0.93944
published_at 2026-04-01T12:55:00Z
1
value 0.12664
scoring_system epss
scoring_elements 0.93953
published_at 2026-04-02T12:55:00Z
2
value 0.12664
scoring_system epss
scoring_elements 0.93962
published_at 2026-04-04T12:55:00Z
3
value 0.12664
scoring_system epss
scoring_elements 0.93964
published_at 2026-04-07T12:55:00Z
4
value 0.12664
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-08T12:55:00Z
5
value 0.12664
scoring_system epss
scoring_elements 0.93976
published_at 2026-04-09T12:55:00Z
6
value 0.12664
scoring_system epss
scoring_elements 0.9398
published_at 2026-04-13T12:55:00Z
7
value 0.12664
scoring_system epss
scoring_elements 0.93995
published_at 2026-04-16T12:55:00Z
8
value 0.12664
scoring_system epss
scoring_elements 0.94
published_at 2026-04-18T12:55:00Z
9
value 0.12664
scoring_system epss
scoring_elements 0.94001
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526637
reference_id 526637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526637
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
8
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
9
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
10
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://access.redhat.com/errata/RHSA-2009:1513
reference_id RHSA-2009:1513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1513
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
15
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3608
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xddx-numk-a7bn
29
url VCID-ynvq-nzrq-9bca
vulnerability_id VCID-ynvq-nzrq-9bca
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
reference_id
reference_type
scores
0
value 0.01745
scoring_system epss
scoring_elements 0.8246
published_at 2026-04-01T12:55:00Z
1
value 0.01745
scoring_system epss
scoring_elements 0.82474
published_at 2026-04-02T12:55:00Z
2
value 0.01745
scoring_system epss
scoring_elements 0.82491
published_at 2026-04-04T12:55:00Z
3
value 0.01745
scoring_system epss
scoring_elements 0.82488
published_at 2026-04-07T12:55:00Z
4
value 0.01745
scoring_system epss
scoring_elements 0.82514
published_at 2026-04-08T12:55:00Z
5
value 0.01745
scoring_system epss
scoring_elements 0.82521
published_at 2026-04-09T12:55:00Z
6
value 0.01745
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-11T12:55:00Z
7
value 0.01745
scoring_system epss
scoring_elements 0.82536
published_at 2026-04-12T12:55:00Z
8
value 0.01745
scoring_system epss
scoring_elements 0.82531
published_at 2026-04-13T12:55:00Z
9
value 0.01745
scoring_system epss
scoring_elements 0.82568
published_at 2026-04-18T12:55:00Z
10
value 0.01745
scoring_system epss
scoring_elements 0.82572
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35b2-jj1x-rkcf
1
vulnerability VCID-4128-ep6n-hufz
2
vulnerability VCID-4yej-ag45-uuga
3
vulnerability VCID-6789-dh3f-rudp
4
vulnerability VCID-6dwz-8kx9-rugr
5
vulnerability VCID-byr3-7wgc-jye9
6
vulnerability VCID-gc6w-tctk-nycd
7
vulnerability VCID-neqs-cg1p-7bb7
8
vulnerability VCID-s66u-r7vs-bfdu
9
vulnerability VCID-uczb-yext-6yfq
10
vulnerability VCID-upkc-66fh-wbby
11
vulnerability VCID-xddx-numk-a7bn
12
vulnerability VCID-yu46-ypr2-dfce
13
vulnerability VCID-z77s-ej5r-rbcd
14
vulnerability VCID-zr8n-mfu1-4yg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny4
aliases CVE-2009-0146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca
30
url VCID-yu46-ypr2-dfce
vulnerability_id VCID-yu46-ypr2-dfce
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3609
reference_id
reference_type
scores
0
value 0.05999
scoring_system epss
scoring_elements 0.90645
published_at 2026-04-01T12:55:00Z
1
value 0.05999
scoring_system epss
scoring_elements 0.9065
published_at 2026-04-02T12:55:00Z
2
value 0.05999
scoring_system epss
scoring_elements 0.9066
published_at 2026-04-04T12:55:00Z
3
value 0.05999
scoring_system epss
scoring_elements 0.90669
published_at 2026-04-07T12:55:00Z
4
value 0.05999
scoring_system epss
scoring_elements 0.90679
published_at 2026-04-08T12:55:00Z
5
value 0.05999
scoring_system epss
scoring_elements 0.90685
published_at 2026-04-09T12:55:00Z
6
value 0.05999
scoring_system epss
scoring_elements 0.90694
published_at 2026-04-12T12:55:00Z
7
value 0.05999
scoring_system epss
scoring_elements 0.9069
published_at 2026-04-13T12:55:00Z
8
value 0.05999
scoring_system epss
scoring_elements 0.90709
published_at 2026-04-16T12:55:00Z
9
value 0.05999
scoring_system epss
scoring_elements 0.90707
published_at 2026-04-18T12:55:00Z
10
value 0.05999
scoring_system epss
scoring_elements 0.90704
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3609
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526893
reference_id 526893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526893
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
12
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
13
reference_url https://access.redhat.com/errata/RHSA-2009:1513
reference_id RHSA-2009:1513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1513
14
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
15
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
16
reference_url https://access.redhat.com/errata/RHSA-2010:0401
reference_id RHSA-2010:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0401
17
reference_url https://access.redhat.com/errata/RHSA-2010:0755
reference_id RHSA-2010:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0755
18
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
19
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
20
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3609
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce
31
url VCID-z77s-ej5r-rbcd
vulnerability_id VCID-z77s-ej5r-rbcd
summary
Multiple vulnerabilities have been discovered in T1Lib, the worst
    of which could lead to remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1552.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1552.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1552
reference_id
reference_type
scores
0
value 0.22374
scoring_system epss
scoring_elements 0.95842
published_at 2026-04-21T12:55:00Z
1
value 0.22374
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-01T12:55:00Z
2
value 0.22374
scoring_system epss
scoring_elements 0.95795
published_at 2026-04-02T12:55:00Z
3
value 0.22374
scoring_system epss
scoring_elements 0.95803
published_at 2026-04-04T12:55:00Z
4
value 0.22374
scoring_system epss
scoring_elements 0.95806
published_at 2026-04-07T12:55:00Z
5
value 0.22374
scoring_system epss
scoring_elements 0.95814
published_at 2026-04-08T12:55:00Z
6
value 0.22374
scoring_system epss
scoring_elements 0.95818
published_at 2026-04-09T12:55:00Z
7
value 0.22374
scoring_system epss
scoring_elements 0.95821
published_at 2026-04-12T12:55:00Z
8
value 0.22374
scoring_system epss
scoring_elements 0.95823
published_at 2026-04-13T12:55:00Z
9
value 0.22374
scoring_system epss
scoring_elements 0.95834
published_at 2026-04-16T12:55:00Z
10
value 0.22374
scoring_system epss
scoring_elements 0.95839
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1552
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552
4
reference_url http://secunia.com/advisories/43823
reference_id
reference_type
scores
url http://secunia.com/advisories/43823
5
reference_url http://secunia.com/advisories/48985
reference_id
reference_type
scores
url http://secunia.com/advisories/48985
6
reference_url http://securityreason.com/securityalert/8171
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8171
7
reference_url http://securitytracker.com/id?1025266
reference_id
reference_type
scores
url http://securitytracker.com/id?1025266
8
reference_url http://www.foolabs.com/xpdf/download.html
reference_id
reference_type
scores
url http://www.foolabs.com/xpdf/download.html
9
reference_url http://www.kb.cert.org/vuls/id/376500
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/376500
10
reference_url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MAPG-8ECL8X
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
12
reference_url http://www.securityfocus.com/archive/1/517205/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517205/100/0/threaded
13
reference_url http://www.toucan-system.com/advisories/tssa-2011-01.txt
reference_id
reference_type
scores
url http://www.toucan-system.com/advisories/tssa-2011-01.txt
14
reference_url http://www.vupen.com/english/advisories/2011/0728
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0728
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692853
reference_id 692853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692853
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1552
reference_id CVE-2011-1552
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1552
81
reference_url https://security.gentoo.org/glsa/201701-57
reference_id GLSA-201701-57
reference_type
scores
url https://security.gentoo.org/glsa/201701-57
82
reference_url https://access.redhat.com/errata/RHSA-2012:0062
reference_id RHSA-2012:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0062
83
reference_url https://access.redhat.com/errata/RHSA-2012:0137
reference_id RHSA-2012:0137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0137
84
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
85
reference_url https://usn.ubuntu.com/1335-1/
reference_id USN-1335-1
reference_type
scores
url https://usn.ubuntu.com/1335-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2011-1552
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z77s-ej5r-rbcd
32
url VCID-zr8n-mfu1-4yg4
vulnerability_id VCID-zr8n-mfu1-4yg4
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3606
reference_id
reference_type
scores
0
value 0.04772
scoring_system epss
scoring_elements 0.8942
published_at 2026-04-01T12:55:00Z
1
value 0.04772
scoring_system epss
scoring_elements 0.89424
published_at 2026-04-02T12:55:00Z
2
value 0.04772
scoring_system epss
scoring_elements 0.89435
published_at 2026-04-04T12:55:00Z
3
value 0.04772
scoring_system epss
scoring_elements 0.89437
published_at 2026-04-07T12:55:00Z
4
value 0.04772
scoring_system epss
scoring_elements 0.89453
published_at 2026-04-08T12:55:00Z
5
value 0.04772
scoring_system epss
scoring_elements 0.89457
published_at 2026-04-09T12:55:00Z
6
value 0.04772
scoring_system epss
scoring_elements 0.89465
published_at 2026-04-11T12:55:00Z
7
value 0.04772
scoring_system epss
scoring_elements 0.89463
published_at 2026-04-12T12:55:00Z
8
value 0.04772
scoring_system epss
scoring_elements 0.89459
published_at 2026-04-13T12:55:00Z
9
value 0.04772
scoring_system epss
scoring_elements 0.89474
published_at 2026-04-18T12:55:00Z
10
value 0.04772
scoring_system epss
scoring_elements 0.89472
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526877
reference_id 526877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526877
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
8
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
9
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
10
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
11
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
12
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
purl pkg:deb/debian/xpdf@3.02-12%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-dh3f-rudp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-12%252Bsqueeze1
aliases CVE-2009-3606
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr8n-mfu1-4yg4
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.01-9.1%252Betch6