Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127860?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127860?format=api", "purl": "pkg:rpm/redhat/tetex@1.0.7-67?arch=19", "type": "rpm", "namespace": "redhat", "name": "tetex", "version": "1.0.7-67", "qualifiers": { "arch": "19" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48369?format=api", "vulnerability_id": "VCID-1upn-29dc-zfcc", "summary": "Multiple vulnerabilities were found in texlive-core, allowing\n attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0827.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89178", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89094", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89153", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89149", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89159", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89156", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04513", "scoring_system": "epss", "scoring_elements": "0.89173", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0827" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201206-28.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml" }, { "reference_url": "http://security-tracker.debian.org/tracker/CVE-2010-0827", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security-tracker.debian.org/tracker/CVE-2010-0827" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052" }, { "reference_url": "http://www.securityfocus.com/bid/39971", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/39971" }, { "reference_url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009&r2=18095", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009&r2=18095" }, { "reference_url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log" }, { "reference_url": "http://www.ubuntu.com/usn/USN-937-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-937-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=572914", "reference_id": "572914", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572914" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580669", "reference_id": "580669", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580669" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0827", "reference_id": "CVE-2010-0827", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0827" }, { "reference_url": "https://security.gentoo.org/glsa/201206-28", "reference_id": "GLSA-201206-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" }, { "reference_url": "https://usn.ubuntu.com/937-1/", "reference_id": "USN-937-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/937-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0827" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1upn-29dc-zfcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48368?format=api", "vulnerability_id": "VCID-4r5u-9w2z-rkgh", "summary": "Multiple vulnerabilities were found in texlive-core, allowing\n attackers to execute arbitrary code.", "references": [ { "reference_url": "http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0739.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0739.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0739", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91934", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91877", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91893", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.919", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91912", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.9192", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91936", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91933", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.9193", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.077", "scoring_system": "epss", "scoring_elements": "0.91935", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0739" }, { "reference_url": "http://secunia.com/advisories/39390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39390" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201206-28.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468" }, { "reference_url": "http://www.securityfocus.com/bid/39500", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/39500" }, { "reference_url": "http://www.ubuntu.com/usn/USN-937-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-937-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560668", "reference_id": "560668", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560668" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=572941", "reference_id": "572941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572941" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0739", "reference_id": "CVE-2010-0739", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0739" }, { "reference_url": "https://security.gentoo.org/glsa/201206-28", "reference_id": "GLSA-201206-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" }, { "reference_url": "https://usn.ubuntu.com/937-1/", "reference_id": "USN-937-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/937-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0739" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4r5u-9w2z-rkgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49036?format=api", "vulnerability_id": "VCID-8qud-4v19-tyh4", "summary": "Multiple vulnerabilities have been discovered in teTeX, possibly allowing\n to execute arbitrary code or overwrite arbitrary files.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5935.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5935.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5935", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.90942", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.90948", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.90957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.90967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.90978", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.90983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.90992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.90991", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.91017", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.91015", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.91031", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0635", "scoring_system": "epss", "scoring_elements": "0.91029", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=368591", "reference_id": "368591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=368591" }, { "reference_url": "https://security.gentoo.org/glsa/200711-26", "reference_id": "GLSA-200711-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200711-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" }, { "reference_url": "https://usn.ubuntu.com/554-1/", "reference_id": "USN-554-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/554-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2007-5935" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8qud-4v19-tyh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48370?format=api", "vulnerability_id": "VCID-ec4g-satx-pqg2", "summary": "Multiple vulnerabilities were found in texlive-core, allowing\n attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1440.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1440.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86276", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86169", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86192", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86193", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86235", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86231", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86254", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86246", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02852", "scoring_system": "epss", "scoring_elements": "0.86267", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1440" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201206-28.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068" }, { "reference_url": "http://www.ubuntu.com/usn/USN-937-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-937-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580668", "reference_id": "580668", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580668" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=586819", "reference_id": "586819", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586819" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1440", "reference_id": "CVE-2010-1440", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1440" }, { "reference_url": "https://security.gentoo.org/glsa/201206-28", "reference_id": "GLSA-201206-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" }, { "reference_url": "https://usn.ubuntu.com/937-1/", "reference_id": "USN-937-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/937-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-1440" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ec4g-satx-pqg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88152?format=api", "vulnerability_id": "VCID-qjzr-avt1-fyfd", "summary": "xpdf: multiple integer overflows", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0791.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0791.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0791", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.8969", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89708", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.8971", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89727", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89741", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89739", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89749", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89744", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89758", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.8976", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840", "reference_id": "491840", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535489", "reference_id": "535489", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1083", "reference_id": "RHSA-2009:1083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" } ], "fixed_packages": [], "aliases": [ "CVE-2009-0791" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjzr-avt1-fyfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31243?format=api", "vulnerability_id": "VCID-yu46-ypr2-dfce", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3609", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9065", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9066", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90669", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90685", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9069", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90709", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90707", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90704", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9072", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90721", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526893", "reference_id": "526893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526893" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1504", "reference_id": "RHSA-2009:1504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1513", "reference_id": "RHSA-2009:1513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1513" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0755", "reference_id": "RHSA-2010:0755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0755" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-3609" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce" } ], "fixing_vulnerabilities": [], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tetex@1.0.7-67%3Farch=19" }