Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/tetex@3.0-33.8.el5_5?arch=5
Typerpm
Namespaceredhat
Nametetex
Version3.0-33.8.el5_5
Qualifiers
arch 5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4r5u-9w2z-rkgh
vulnerability_id VCID-4r5u-9w2z-rkgh
summary
Multiple vulnerabilities were found in texlive-core, allowing
    attackers to execute arbitrary code.
references
0
reference_url http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch
reference_id
reference_type
scores
url http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0739.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0739
reference_id
reference_type
scores
0
value 0.077
scoring_system epss
scoring_elements 0.91935
published_at 2026-04-24T12:55:00Z
1
value 0.077
scoring_system epss
scoring_elements 0.91877
published_at 2026-04-01T12:55:00Z
2
value 0.077
scoring_system epss
scoring_elements 0.91885
published_at 2026-04-02T12:55:00Z
3
value 0.077
scoring_system epss
scoring_elements 0.91893
published_at 2026-04-04T12:55:00Z
4
value 0.077
scoring_system epss
scoring_elements 0.919
published_at 2026-04-07T12:55:00Z
5
value 0.077
scoring_system epss
scoring_elements 0.91912
published_at 2026-04-08T12:55:00Z
6
value 0.077
scoring_system epss
scoring_elements 0.91918
published_at 2026-04-09T12:55:00Z
7
value 0.077
scoring_system epss
scoring_elements 0.91921
published_at 2026-04-11T12:55:00Z
8
value 0.077
scoring_system epss
scoring_elements 0.9192
published_at 2026-04-12T12:55:00Z
9
value 0.077
scoring_system epss
scoring_elements 0.91917
published_at 2026-04-13T12:55:00Z
10
value 0.077
scoring_system epss
scoring_elements 0.91936
published_at 2026-04-16T12:55:00Z
11
value 0.077
scoring_system epss
scoring_elements 0.91933
published_at 2026-04-18T12:55:00Z
12
value 0.077
scoring_system epss
scoring_elements 0.9193
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0739
7
reference_url http://secunia.com/advisories/39390
reference_id
reference_type
scores
url http://secunia.com/advisories/39390
8
reference_url http://security.gentoo.org/glsa/glsa-201206-28.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201206-28.xml
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468
10
reference_url http://www.securityfocus.com/bid/39500
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/39500
11
reference_url http://www.ubuntu.com/usn/USN-937-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-937-1
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560668
reference_id 560668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560668
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=572941
reference_id 572941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=572941
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0739
reference_id CVE-2010-0739
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-0739
17
reference_url https://security.gentoo.org/glsa/201206-28
reference_id GLSA-201206-28
reference_type
scores
url https://security.gentoo.org/glsa/201206-28
18
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
19
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
20
reference_url https://access.redhat.com/errata/RHSA-2010:0401
reference_id RHSA-2010:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0401
21
reference_url https://usn.ubuntu.com/937-1/
reference_id USN-937-1
reference_type
scores
url https://usn.ubuntu.com/937-1/
fixed_packages
aliases CVE-2010-0739
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4r5u-9w2z-rkgh
1
url VCID-65sa-tagy-3ybs
vulnerability_id VCID-65sa-tagy-3ybs
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76549
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76577
published_at 2026-04-04T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76558
published_at 2026-04-07T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.7659
published_at 2026-04-08T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76601
published_at 2026-04-09T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-11T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76607
published_at 2026-04-12T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-13T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76639
published_at 2026-04-16T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-18T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.76631
published_at 2026-04-21T12:55:00Z
12
value 0.00968
scoring_system epss
scoring_elements 0.76663
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495886
reference_id 495886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495886
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-0799
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs
2
url VCID-68rw-a4ah-5khm
vulnerability_id VCID-68rw-a4ah-5khm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
reference_id
reference_type
scores
0
value 0.07101
scoring_system epss
scoring_elements 0.91487
published_at 2026-04-01T12:55:00Z
1
value 0.07101
scoring_system epss
scoring_elements 0.91493
published_at 2026-04-02T12:55:00Z
2
value 0.07101
scoring_system epss
scoring_elements 0.915
published_at 2026-04-04T12:55:00Z
3
value 0.07101
scoring_system epss
scoring_elements 0.91508
published_at 2026-04-07T12:55:00Z
4
value 0.07101
scoring_system epss
scoring_elements 0.91521
published_at 2026-04-08T12:55:00Z
5
value 0.07101
scoring_system epss
scoring_elements 0.91527
published_at 2026-04-09T12:55:00Z
6
value 0.07101
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-11T12:55:00Z
7
value 0.07101
scoring_system epss
scoring_elements 0.91533
published_at 2026-04-12T12:55:00Z
8
value 0.07101
scoring_system epss
scoring_elements 0.91531
published_at 2026-04-13T12:55:00Z
9
value 0.07101
scoring_system epss
scoring_elements 0.91554
published_at 2026-04-16T12:55:00Z
10
value 0.07101
scoring_system epss
scoring_elements 0.91549
published_at 2026-04-21T12:55:00Z
11
value 0.07101
scoring_system epss
scoring_elements 0.91557
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495896
reference_id 495896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495896
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
aliases CVE-2009-1182
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm
3
url VCID-94qj-jzse-vuhv
vulnerability_id VCID-94qj-jzse-vuhv
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0829.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0829.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0829
reference_id
reference_type
scores
0
value 0.0504
scoring_system epss
scoring_elements 0.89782
published_at 2026-04-24T12:55:00Z
1
value 0.0504
scoring_system epss
scoring_elements 0.89715
published_at 2026-04-01T12:55:00Z
2
value 0.0504
scoring_system epss
scoring_elements 0.89718
published_at 2026-04-02T12:55:00Z
3
value 0.0504
scoring_system epss
scoring_elements 0.89732
published_at 2026-04-04T12:55:00Z
4
value 0.0504
scoring_system epss
scoring_elements 0.89734
published_at 2026-04-07T12:55:00Z
5
value 0.0504
scoring_system epss
scoring_elements 0.89752
published_at 2026-04-08T12:55:00Z
6
value 0.0504
scoring_system epss
scoring_elements 0.89758
published_at 2026-04-09T12:55:00Z
7
value 0.0504
scoring_system epss
scoring_elements 0.89765
published_at 2026-04-11T12:55:00Z
8
value 0.0504
scoring_system epss
scoring_elements 0.89763
published_at 2026-04-12T12:55:00Z
9
value 0.0504
scoring_system epss
scoring_elements 0.89756
published_at 2026-04-13T12:55:00Z
10
value 0.0504
scoring_system epss
scoring_elements 0.89773
published_at 2026-04-18T12:55:00Z
11
value 0.0504
scoring_system epss
scoring_elements 0.89768
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0829
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0829
6
reference_url http://secunia.com/advisories/39914
reference_id
reference_type
scores
url http://secunia.com/advisories/39914
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718
8
reference_url http://www.debian.org/security/2010/dsa-2048
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2048
9
reference_url http://www.ubuntu.com/usn/USN-936-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-936-1
10
reference_url http://www.vupen.com/english/advisories/2010/1219
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1219
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=573999
reference_id 573999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=573999
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580628
reference_id 580628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580628
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jan-ake_larsson:dvipng:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jan-ake_larsson:dvipng:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jan-ake_larsson:dvipng:1.11:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jan-ake_larsson:dvipng:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jan-ake_larsson:dvipng:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jan-ake_larsson:dvipng:1.12:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0829
reference_id CVE-2010-0829
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-0829
17
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
18
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
19
reference_url https://usn.ubuntu.com/936-1/
reference_id USN-936-1
reference_type
scores
url https://usn.ubuntu.com/936-1/
fixed_packages
aliases CVE-2010-0829
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-94qj-jzse-vuhv
4
url VCID-ctb2-8h4y-vybd
vulnerability_id VCID-ctb2-8h4y-vybd
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
reference_id
reference_type
scores
0
value 0.0519
scoring_system epss
scoring_elements 0.8988
published_at 2026-04-01T12:55:00Z
1
value 0.0519
scoring_system epss
scoring_elements 0.89883
published_at 2026-04-02T12:55:00Z
2
value 0.0519
scoring_system epss
scoring_elements 0.89895
published_at 2026-04-04T12:55:00Z
3
value 0.0519
scoring_system epss
scoring_elements 0.899
published_at 2026-04-07T12:55:00Z
4
value 0.0519
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-08T12:55:00Z
5
value 0.0519
scoring_system epss
scoring_elements 0.89922
published_at 2026-04-09T12:55:00Z
6
value 0.0519
scoring_system epss
scoring_elements 0.89929
published_at 2026-04-11T12:55:00Z
7
value 0.0519
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-12T12:55:00Z
8
value 0.0519
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-13T12:55:00Z
9
value 0.0519
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-16T12:55:00Z
10
value 0.0519
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-18T12:55:00Z
11
value 0.0519
scoring_system epss
scoring_elements 0.89931
published_at 2026-04-21T12:55:00Z
12
value 0.0519
scoring_system epss
scoring_elements 0.89947
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490625
reference_id 490625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490625
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-0166
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd
5
url VCID-ctdw-25y5-8kdm
vulnerability_id VCID-ctdw-25y5-8kdm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
reference_id
reference_type
scores
0
value 0.09017
scoring_system epss
scoring_elements 0.92595
published_at 2026-04-01T12:55:00Z
1
value 0.09017
scoring_system epss
scoring_elements 0.92601
published_at 2026-04-02T12:55:00Z
2
value 0.09017
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-04T12:55:00Z
3
value 0.09017
scoring_system epss
scoring_elements 0.92608
published_at 2026-04-07T12:55:00Z
4
value 0.09017
scoring_system epss
scoring_elements 0.92619
published_at 2026-04-08T12:55:00Z
5
value 0.09017
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-09T12:55:00Z
6
value 0.09017
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-13T12:55:00Z
7
value 0.09017
scoring_system epss
scoring_elements 0.92642
published_at 2026-04-16T12:55:00Z
8
value 0.09017
scoring_system epss
scoring_elements 0.92641
published_at 2026-04-18T12:55:00Z
9
value 0.09017
scoring_system epss
scoring_elements 0.92645
published_at 2026-04-21T12:55:00Z
10
value 0.09017
scoring_system epss
scoring_elements 0.92647
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
6
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
7
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
8
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
9
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
10
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
11
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
12
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
13
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-0195
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm
6
url VCID-dgb8-nes9-8fb7
vulnerability_id VCID-dgb8-nes9-8fb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
reference_id
reference_type
scores
0
value 0.02384
scoring_system epss
scoring_elements 0.84926
published_at 2026-04-01T12:55:00Z
1
value 0.02384
scoring_system epss
scoring_elements 0.8494
published_at 2026-04-02T12:55:00Z
2
value 0.02384
scoring_system epss
scoring_elements 0.84959
published_at 2026-04-04T12:55:00Z
3
value 0.02384
scoring_system epss
scoring_elements 0.84963
published_at 2026-04-07T12:55:00Z
4
value 0.02384
scoring_system epss
scoring_elements 0.84986
published_at 2026-04-08T12:55:00Z
5
value 0.02384
scoring_system epss
scoring_elements 0.84993
published_at 2026-04-09T12:55:00Z
6
value 0.02384
scoring_system epss
scoring_elements 0.85008
published_at 2026-04-11T12:55:00Z
7
value 0.02384
scoring_system epss
scoring_elements 0.85006
published_at 2026-04-12T12:55:00Z
8
value 0.02384
scoring_system epss
scoring_elements 0.85003
published_at 2026-04-13T12:55:00Z
9
value 0.02384
scoring_system epss
scoring_elements 0.85024
published_at 2026-04-16T12:55:00Z
10
value 0.02384
scoring_system epss
scoring_elements 0.85026
published_at 2026-04-18T12:55:00Z
11
value 0.02384
scoring_system epss
scoring_elements 0.85023
published_at 2026-04-21T12:55:00Z
12
value 0.02384
scoring_system epss
scoring_elements 0.85048
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490614
reference_id 490614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490614
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-0147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7
7
url VCID-ec4g-satx-pqg2
vulnerability_id VCID-ec4g-satx-pqg2
summary
Multiple vulnerabilities were found in texlive-core, allowing
    attackers to execute arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1440.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1440.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1440
reference_id
reference_type
scores
0
value 0.02852
scoring_system epss
scoring_elements 0.86267
published_at 2026-04-24T12:55:00Z
1
value 0.02852
scoring_system epss
scoring_elements 0.86169
published_at 2026-04-01T12:55:00Z
2
value 0.02852
scoring_system epss
scoring_elements 0.86179
published_at 2026-04-02T12:55:00Z
3
value 0.02852
scoring_system epss
scoring_elements 0.86192
published_at 2026-04-04T12:55:00Z
4
value 0.02852
scoring_system epss
scoring_elements 0.86193
published_at 2026-04-07T12:55:00Z
5
value 0.02852
scoring_system epss
scoring_elements 0.86212
published_at 2026-04-08T12:55:00Z
6
value 0.02852
scoring_system epss
scoring_elements 0.86223
published_at 2026-04-09T12:55:00Z
7
value 0.02852
scoring_system epss
scoring_elements 0.86238
published_at 2026-04-11T12:55:00Z
8
value 0.02852
scoring_system epss
scoring_elements 0.86235
published_at 2026-04-12T12:55:00Z
9
value 0.02852
scoring_system epss
scoring_elements 0.86231
published_at 2026-04-13T12:55:00Z
10
value 0.02852
scoring_system epss
scoring_elements 0.86248
published_at 2026-04-16T12:55:00Z
11
value 0.02852
scoring_system epss
scoring_elements 0.86254
published_at 2026-04-18T12:55:00Z
12
value 0.02852
scoring_system epss
scoring_elements 0.86246
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1440
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1440
6
reference_url http://security.gentoo.org/glsa/glsa-201206-28.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201206-28.xml
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068
8
reference_url http://www.ubuntu.com/usn/USN-937-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-937-1
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580668
reference_id 580668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580668
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=586819
reference_id 586819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=586819
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1440
reference_id CVE-2010-1440
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1440
25
reference_url https://security.gentoo.org/glsa/201206-28
reference_id GLSA-201206-28
reference_type
scores
url https://security.gentoo.org/glsa/201206-28
26
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
27
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
28
reference_url https://access.redhat.com/errata/RHSA-2010:0401
reference_id RHSA-2010:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0401
29
reference_url https://usn.ubuntu.com/937-1/
reference_id USN-937-1
reference_type
scores
url https://usn.ubuntu.com/937-1/
fixed_packages
aliases CVE-2010-1440
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ec4g-satx-pqg2
8
url VCID-gbm8-vcwy-u3g2
vulnerability_id VCID-gbm8-vcwy-u3g2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
reference_id
reference_type
scores
0
value 0.27841
scoring_system epss
scoring_elements 0.96426
published_at 2026-04-01T12:55:00Z
1
value 0.27841
scoring_system epss
scoring_elements 0.96433
published_at 2026-04-02T12:55:00Z
2
value 0.27841
scoring_system epss
scoring_elements 0.96437
published_at 2026-04-04T12:55:00Z
3
value 0.27841
scoring_system epss
scoring_elements 0.9644
published_at 2026-04-07T12:55:00Z
4
value 0.27841
scoring_system epss
scoring_elements 0.96449
published_at 2026-04-08T12:55:00Z
5
value 0.27841
scoring_system epss
scoring_elements 0.96452
published_at 2026-04-09T12:55:00Z
6
value 0.27841
scoring_system epss
scoring_elements 0.96456
published_at 2026-04-11T12:55:00Z
7
value 0.27841
scoring_system epss
scoring_elements 0.96457
published_at 2026-04-12T12:55:00Z
8
value 0.27841
scoring_system epss
scoring_elements 0.96459
published_at 2026-04-13T12:55:00Z
9
value 0.27841
scoring_system epss
scoring_elements 0.96466
published_at 2026-04-16T12:55:00Z
10
value 0.27841
scoring_system epss
scoring_elements 0.9647
published_at 2026-04-18T12:55:00Z
11
value 0.27841
scoring_system epss
scoring_elements 0.96473
published_at 2026-04-21T12:55:00Z
12
value 0.27841
scoring_system epss
scoring_elements 0.96474
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495889
reference_id 495889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495889
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-1179
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2
9
url VCID-jvuz-2phs-87du
vulnerability_id VCID-jvuz-2phs-87du
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
reference_id
reference_type
scores
0
value 0.08831
scoring_system epss
scoring_elements 0.92498
published_at 2026-04-01T12:55:00Z
1
value 0.08831
scoring_system epss
scoring_elements 0.92504
published_at 2026-04-02T12:55:00Z
2
value 0.08831
scoring_system epss
scoring_elements 0.92512
published_at 2026-04-04T12:55:00Z
3
value 0.08831
scoring_system epss
scoring_elements 0.92514
published_at 2026-04-07T12:55:00Z
4
value 0.08831
scoring_system epss
scoring_elements 0.92526
published_at 2026-04-08T12:55:00Z
5
value 0.08831
scoring_system epss
scoring_elements 0.9253
published_at 2026-04-09T12:55:00Z
6
value 0.08831
scoring_system epss
scoring_elements 0.92537
published_at 2026-04-13T12:55:00Z
7
value 0.08831
scoring_system epss
scoring_elements 0.92538
published_at 2026-04-12T12:55:00Z
8
value 0.08831
scoring_system epss
scoring_elements 0.92547
published_at 2026-04-18T12:55:00Z
9
value 0.08831
scoring_system epss
scoring_elements 0.92549
published_at 2026-04-21T12:55:00Z
10
value 0.08831
scoring_system epss
scoring_elements 0.92551
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495892
reference_id 495892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495892
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-1180
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du
10
url VCID-qjzr-avt1-fyfd
vulnerability_id VCID-qjzr-avt1-fyfd
summary xpdf: multiple integer overflows
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0791.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0791
reference_id
reference_type
scores
0
value 0.05022
scoring_system epss
scoring_elements 0.8969
published_at 2026-04-01T12:55:00Z
1
value 0.05022
scoring_system epss
scoring_elements 0.89693
published_at 2026-04-02T12:55:00Z
2
value 0.05022
scoring_system epss
scoring_elements 0.89708
published_at 2026-04-04T12:55:00Z
3
value 0.05022
scoring_system epss
scoring_elements 0.8971
published_at 2026-04-07T12:55:00Z
4
value 0.05022
scoring_system epss
scoring_elements 0.89727
published_at 2026-04-08T12:55:00Z
5
value 0.05022
scoring_system epss
scoring_elements 0.89734
published_at 2026-04-09T12:55:00Z
6
value 0.05022
scoring_system epss
scoring_elements 0.89741
published_at 2026-04-11T12:55:00Z
7
value 0.05022
scoring_system epss
scoring_elements 0.89739
published_at 2026-04-12T12:55:00Z
8
value 0.05022
scoring_system epss
scoring_elements 0.89732
published_at 2026-04-13T12:55:00Z
9
value 0.05022
scoring_system epss
scoring_elements 0.89749
published_at 2026-04-18T12:55:00Z
10
value 0.05022
scoring_system epss
scoring_elements 0.89744
published_at 2026-04-21T12:55:00Z
11
value 0.05022
scoring_system epss
scoring_elements 0.89758
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0791
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491840
reference_id 491840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491840
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535489
reference_id 535489
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535489
5
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
6
reference_url https://access.redhat.com/errata/RHSA-2009:1083
reference_id RHSA-2009:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1083
7
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://access.redhat.com/errata/RHSA-2010:0401
reference_id RHSA-2010:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0401
fixed_packages
aliases CVE-2009-0791
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjzr-avt1-fyfd
11
url VCID-rm6a-c4rf-f7hc
vulnerability_id VCID-rm6a-c4rf-f7hc
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
reference_id
reference_type
scores
0
value 0.08985
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-01T12:55:00Z
1
value 0.08985
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-02T12:55:00Z
2
value 0.08985
scoring_system epss
scoring_elements 0.92587
published_at 2026-04-04T12:55:00Z
3
value 0.08985
scoring_system epss
scoring_elements 0.92588
published_at 2026-04-07T12:55:00Z
4
value 0.08985
scoring_system epss
scoring_elements 0.926
published_at 2026-04-08T12:55:00Z
5
value 0.08985
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-09T12:55:00Z
6
value 0.08985
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-13T12:55:00Z
7
value 0.08985
scoring_system epss
scoring_elements 0.92611
published_at 2026-04-12T12:55:00Z
8
value 0.08985
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-16T12:55:00Z
9
value 0.08985
scoring_system epss
scoring_elements 0.92623
published_at 2026-04-18T12:55:00Z
10
value 0.08985
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-21T12:55:00Z
11
value 0.08985
scoring_system epss
scoring_elements 0.92628
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495887
reference_id 495887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495887
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-0800
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc
12
url VCID-uny2-k19n-1bb2
vulnerability_id VCID-uny2-k19n-1bb2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
reference_id
reference_type
scores
0
value 0.02433
scoring_system epss
scoring_elements 0.85086
published_at 2026-04-01T12:55:00Z
1
value 0.02433
scoring_system epss
scoring_elements 0.85098
published_at 2026-04-02T12:55:00Z
2
value 0.02433
scoring_system epss
scoring_elements 0.85116
published_at 2026-04-04T12:55:00Z
3
value 0.02433
scoring_system epss
scoring_elements 0.85119
published_at 2026-04-07T12:55:00Z
4
value 0.02433
scoring_system epss
scoring_elements 0.85141
published_at 2026-04-08T12:55:00Z
5
value 0.02433
scoring_system epss
scoring_elements 0.85148
published_at 2026-04-09T12:55:00Z
6
value 0.02433
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-11T12:55:00Z
7
value 0.02433
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-12T12:55:00Z
8
value 0.02433
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-13T12:55:00Z
9
value 0.02433
scoring_system epss
scoring_elements 0.85177
published_at 2026-04-21T12:55:00Z
10
value 0.02433
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-18T12:55:00Z
11
value 0.02433
scoring_system epss
scoring_elements 0.852
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495894
reference_id 495894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495894
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-1181
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2
13
url VCID-vudr-8rrg-hufx
vulnerability_id VCID-vudr-8rrg-hufx
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
reference_id
reference_type
scores
0
value 0.01703
scoring_system epss
scoring_elements 0.82232
published_at 2026-04-01T12:55:00Z
1
value 0.01703
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-02T12:55:00Z
2
value 0.01703
scoring_system epss
scoring_elements 0.82264
published_at 2026-04-04T12:55:00Z
3
value 0.01703
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-07T12:55:00Z
4
value 0.01703
scoring_system epss
scoring_elements 0.82285
published_at 2026-04-08T12:55:00Z
5
value 0.01703
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-09T12:55:00Z
6
value 0.01703
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-11T12:55:00Z
7
value 0.01703
scoring_system epss
scoring_elements 0.82306
published_at 2026-04-12T12:55:00Z
8
value 0.01703
scoring_system epss
scoring_elements 0.823
published_at 2026-04-13T12:55:00Z
9
value 0.01703
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-18T12:55:00Z
10
value 0.01703
scoring_system epss
scoring_elements 0.82337
published_at 2026-04-21T12:55:00Z
11
value 0.01703
scoring_system epss
scoring_elements 0.82358
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495899
reference_id 495899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495899
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
aliases CVE-2009-1183
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx
14
url VCID-xddx-numk-a7bn
vulnerability_id VCID-xddx-numk-a7bn
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3608
reference_id
reference_type
scores
0
value 0.12664
scoring_system epss
scoring_elements 0.93944
published_at 2026-04-01T12:55:00Z
1
value 0.12664
scoring_system epss
scoring_elements 0.93953
published_at 2026-04-02T12:55:00Z
2
value 0.12664
scoring_system epss
scoring_elements 0.93962
published_at 2026-04-04T12:55:00Z
3
value 0.12664
scoring_system epss
scoring_elements 0.93964
published_at 2026-04-07T12:55:00Z
4
value 0.12664
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-08T12:55:00Z
5
value 0.12664
scoring_system epss
scoring_elements 0.93976
published_at 2026-04-09T12:55:00Z
6
value 0.12664
scoring_system epss
scoring_elements 0.9398
published_at 2026-04-13T12:55:00Z
7
value 0.12664
scoring_system epss
scoring_elements 0.93995
published_at 2026-04-16T12:55:00Z
8
value 0.12664
scoring_system epss
scoring_elements 0.94
published_at 2026-04-18T12:55:00Z
9
value 0.12664
scoring_system epss
scoring_elements 0.94001
published_at 2026-04-21T12:55:00Z
10
value 0.12664
scoring_system epss
scoring_elements 0.94003
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526637
reference_id 526637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526637
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
8
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
9
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
10
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://access.redhat.com/errata/RHSA-2009:1513
reference_id RHSA-2009:1513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1513
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
15
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-3608
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xddx-numk-a7bn
15
url VCID-ynvq-nzrq-9bca
vulnerability_id VCID-ynvq-nzrq-9bca
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
reference_id
reference_type
scores
0
value 0.01745
scoring_system epss
scoring_elements 0.8246
published_at 2026-04-01T12:55:00Z
1
value 0.01745
scoring_system epss
scoring_elements 0.82474
published_at 2026-04-02T12:55:00Z
2
value 0.01745
scoring_system epss
scoring_elements 0.82491
published_at 2026-04-04T12:55:00Z
3
value 0.01745
scoring_system epss
scoring_elements 0.82488
published_at 2026-04-07T12:55:00Z
4
value 0.01745
scoring_system epss
scoring_elements 0.82514
published_at 2026-04-08T12:55:00Z
5
value 0.01745
scoring_system epss
scoring_elements 0.82521
published_at 2026-04-09T12:55:00Z
6
value 0.01745
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-11T12:55:00Z
7
value 0.01745
scoring_system epss
scoring_elements 0.82536
published_at 2026-04-12T12:55:00Z
8
value 0.01745
scoring_system epss
scoring_elements 0.82531
published_at 2026-04-13T12:55:00Z
9
value 0.01745
scoring_system epss
scoring_elements 0.82568
published_at 2026-04-18T12:55:00Z
10
value 0.01745
scoring_system epss
scoring_elements 0.82572
published_at 2026-04-21T12:55:00Z
11
value 0.01745
scoring_system epss
scoring_elements 0.82594
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-0146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca
16
url VCID-yu46-ypr2-dfce
vulnerability_id VCID-yu46-ypr2-dfce
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3609
reference_id
reference_type
scores
0
value 0.05999
scoring_system epss
scoring_elements 0.90645
published_at 2026-04-01T12:55:00Z
1
value 0.05999
scoring_system epss
scoring_elements 0.9065
published_at 2026-04-02T12:55:00Z
2
value 0.05999
scoring_system epss
scoring_elements 0.9066
published_at 2026-04-04T12:55:00Z
3
value 0.05999
scoring_system epss
scoring_elements 0.90669
published_at 2026-04-07T12:55:00Z
4
value 0.05999
scoring_system epss
scoring_elements 0.90679
published_at 2026-04-08T12:55:00Z
5
value 0.05999
scoring_system epss
scoring_elements 0.90685
published_at 2026-04-09T12:55:00Z
6
value 0.05999
scoring_system epss
scoring_elements 0.90694
published_at 2026-04-12T12:55:00Z
7
value 0.05999
scoring_system epss
scoring_elements 0.9069
published_at 2026-04-13T12:55:00Z
8
value 0.05999
scoring_system epss
scoring_elements 0.90709
published_at 2026-04-16T12:55:00Z
9
value 0.05999
scoring_system epss
scoring_elements 0.90707
published_at 2026-04-18T12:55:00Z
10
value 0.05999
scoring_system epss
scoring_elements 0.90704
published_at 2026-04-21T12:55:00Z
11
value 0.05999
scoring_system epss
scoring_elements 0.9072
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3609
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526893
reference_id 526893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526893
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
12
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
13
reference_url https://access.redhat.com/errata/RHSA-2009:1513
reference_id RHSA-2009:1513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1513
14
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
15
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
16
reference_url https://access.redhat.com/errata/RHSA-2010:0401
reference_id RHSA-2010:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0401
17
reference_url https://access.redhat.com/errata/RHSA-2010:0755
reference_id RHSA-2010:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0755
18
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
19
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
20
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
aliases CVE-2009-3609
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce
Fixing_vulnerabilities
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tetex@3.0-33.8.el5_5%3Farch=5