Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-text/poppler@0.22.2-r1
Typeebuild
Namespaceapp-text
Namepoppler
Version0.22.2-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.24.5
Latest_non_vulnerable_version25.06.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-35b2-jj1x-rkcf
vulnerability_id VCID-35b2-jj1x-rkcf
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3604
reference_id
reference_type
scores
0
value 0.07495
scoring_system epss
scoring_elements 0.91751
published_at 2026-04-01T12:55:00Z
1
value 0.07495
scoring_system epss
scoring_elements 0.9176
published_at 2026-04-02T12:55:00Z
2
value 0.07495
scoring_system epss
scoring_elements 0.91766
published_at 2026-04-04T12:55:00Z
3
value 0.07495
scoring_system epss
scoring_elements 0.91773
published_at 2026-04-07T12:55:00Z
4
value 0.07495
scoring_system epss
scoring_elements 0.91785
published_at 2026-04-08T12:55:00Z
5
value 0.07495
scoring_system epss
scoring_elements 0.91792
published_at 2026-04-09T12:55:00Z
6
value 0.07495
scoring_system epss
scoring_elements 0.91795
published_at 2026-04-11T12:55:00Z
7
value 0.07495
scoring_system epss
scoring_elements 0.91797
published_at 2026-04-12T12:55:00Z
8
value 0.07495
scoring_system epss
scoring_elements 0.91793
published_at 2026-04-13T12:55:00Z
9
value 0.07495
scoring_system epss
scoring_elements 0.91812
published_at 2026-04-26T12:55:00Z
10
value 0.07495
scoring_system epss
scoring_elements 0.91805
published_at 2026-04-18T12:55:00Z
11
value 0.07495
scoring_system epss
scoring_elements 0.91806
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526911
reference_id 526911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526911
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
8
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
9
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
10
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
11
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
12
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
13
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
14
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-3604
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35b2-jj1x-rkcf
1
url VCID-3eaw-7xrw-tkft
vulnerability_id VCID-3eaw-7xrw-tkft
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3605.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3605
reference_id
reference_type
scores
0
value 0.04392
scoring_system epss
scoring_elements 0.88942
published_at 2026-04-01T12:55:00Z
1
value 0.04392
scoring_system epss
scoring_elements 0.8895
published_at 2026-04-02T12:55:00Z
2
value 0.04392
scoring_system epss
scoring_elements 0.88966
published_at 2026-04-04T12:55:00Z
3
value 0.04392
scoring_system epss
scoring_elements 0.88969
published_at 2026-04-07T12:55:00Z
4
value 0.04392
scoring_system epss
scoring_elements 0.88987
published_at 2026-04-08T12:55:00Z
5
value 0.04392
scoring_system epss
scoring_elements 0.88992
published_at 2026-04-09T12:55:00Z
6
value 0.04392
scoring_system epss
scoring_elements 0.89004
published_at 2026-04-11T12:55:00Z
7
value 0.04392
scoring_system epss
scoring_elements 0.89
published_at 2026-04-12T12:55:00Z
8
value 0.04392
scoring_system epss
scoring_elements 0.88998
published_at 2026-04-13T12:55:00Z
9
value 0.04392
scoring_system epss
scoring_elements 0.89012
published_at 2026-04-16T12:55:00Z
10
value 0.04392
scoring_system epss
scoring_elements 0.8901
published_at 2026-04-18T12:55:00Z
11
value 0.04392
scoring_system epss
scoring_elements 0.89005
published_at 2026-04-21T12:55:00Z
12
value 0.04392
scoring_system epss
scoring_elements 0.89022
published_at 2026-04-24T12:55:00Z
13
value 0.04392
scoring_system epss
scoring_elements 0.8903
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3605
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491840
reference_id 491840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491840
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
6
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-3605
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3eaw-7xrw-tkft
2
url VCID-4128-ep6n-hufz
vulnerability_id VCID-4128-ep6n-hufz
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3704
reference_id
reference_type
scores
0
value 0.01395
scoring_system epss
scoring_elements 0.80455
published_at 2026-04-26T12:55:00Z
1
value 0.01395
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-01T12:55:00Z
2
value 0.01395
scoring_system epss
scoring_elements 0.80345
published_at 2026-04-02T12:55:00Z
3
value 0.01395
scoring_system epss
scoring_elements 0.80365
published_at 2026-04-04T12:55:00Z
4
value 0.01395
scoring_system epss
scoring_elements 0.80354
published_at 2026-04-07T12:55:00Z
5
value 0.01395
scoring_system epss
scoring_elements 0.80382
published_at 2026-04-08T12:55:00Z
6
value 0.01395
scoring_system epss
scoring_elements 0.80392
published_at 2026-04-09T12:55:00Z
7
value 0.01395
scoring_system epss
scoring_elements 0.80411
published_at 2026-04-11T12:55:00Z
8
value 0.01395
scoring_system epss
scoring_elements 0.80396
published_at 2026-04-12T12:55:00Z
9
value 0.01395
scoring_system epss
scoring_elements 0.80389
published_at 2026-04-13T12:55:00Z
10
value 0.01395
scoring_system epss
scoring_elements 0.80418
published_at 2026-04-16T12:55:00Z
11
value 0.01395
scoring_system epss
scoring_elements 0.8042
published_at 2026-04-18T12:55:00Z
12
value 0.01395
scoring_system epss
scoring_elements 0.80423
published_at 2026-04-21T12:55:00Z
13
value 0.01395
scoring_system epss
scoring_elements 0.80449
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3704
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
14
reference_url http://secunia.com/advisories/42141
reference_id
reference_type
scores
url http://secunia.com/advisories/42141
15
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
16
reference_url http://secunia.com/advisories/42397
reference_id
reference_type
scores
url http://secunia.com/advisories/42397
17
reference_url http://secunia.com/advisories/42691
reference_id
reference_type
scores
url http://secunia.com/advisories/42691
18
reference_url http://secunia.com/advisories/43079
reference_id
reference_type
scores
url http://secunia.com/advisories/43079
19
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
20
reference_url http://www.debian.org/security/2010/dsa-2119
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2119
21
reference_url http://www.debian.org/security/2010/dsa-2135
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2135
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
27
reference_url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
28
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
29
reference_url http://www.redhat.com/support/errata/RHSA-2010-0749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0749.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2010-0751.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0751.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2010-0752.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0752.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2010-0753.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0753.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
34
reference_url http://www.securityfocus.com/bid/43841
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43841
35
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
36
reference_url http://www.vupen.com/english/advisories/2010/2897
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2897
37
reference_url http://www.vupen.com/english/advisories/2010/3097
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3097
38
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=638960
reference_id 638960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=638960
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3704
reference_id CVE-2010-3704
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3704
117
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
118
reference_url https://security.gentoo.org/glsa/201402-17
reference_id GLSA-201402-17
reference_type
scores
url https://security.gentoo.org/glsa/201402-17
119
reference_url https://access.redhat.com/errata/RHSA-2010:0749
reference_id RHSA-2010:0749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0749
120
reference_url https://access.redhat.com/errata/RHSA-2010:0751
reference_id RHSA-2010:0751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0751
121
reference_url https://access.redhat.com/errata/RHSA-2010:0752
reference_id RHSA-2010:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0752
122
reference_url https://access.redhat.com/errata/RHSA-2010:0753
reference_id RHSA-2010:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0753
123
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
124
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
125
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2010-3704
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4128-ep6n-hufz
3
url VCID-4jfu-4w71-g7bt
vulnerability_id VCID-4jfu-4w71-g7bt
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1187
reference_id
reference_type
scores
0
value 0.39915
scoring_system epss
scoring_elements 0.97303
published_at 2026-04-01T12:55:00Z
1
value 0.39915
scoring_system epss
scoring_elements 0.97309
published_at 2026-04-02T12:55:00Z
2
value 0.39915
scoring_system epss
scoring_elements 0.97314
published_at 2026-04-04T12:55:00Z
3
value 0.39915
scoring_system epss
scoring_elements 0.97315
published_at 2026-04-07T12:55:00Z
4
value 0.39915
scoring_system epss
scoring_elements 0.97322
published_at 2026-04-09T12:55:00Z
5
value 0.39915
scoring_system epss
scoring_elements 0.97324
published_at 2026-04-11T12:55:00Z
6
value 0.39915
scoring_system epss
scoring_elements 0.97325
published_at 2026-04-12T12:55:00Z
7
value 0.39915
scoring_system epss
scoring_elements 0.97326
published_at 2026-04-13T12:55:00Z
8
value 0.39915
scoring_system epss
scoring_elements 0.97334
published_at 2026-04-16T12:55:00Z
9
value 0.39915
scoring_system epss
scoring_elements 0.97337
published_at 2026-04-18T12:55:00Z
10
value 0.39915
scoring_system epss
scoring_elements 0.97338
published_at 2026-04-24T12:55:00Z
11
value 0.39915
scoring_system epss
scoring_elements 0.97339
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495906
reference_id 495906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495906
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
6
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
7
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-1187
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jfu-4w71-g7bt
4
url VCID-4yej-ag45-uuga
vulnerability_id VCID-4yej-ag45-uuga
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3703
reference_id
reference_type
scores
0
value 0.01118
scoring_system epss
scoring_elements 0.78286
published_at 2026-04-26T12:55:00Z
1
value 0.01118
scoring_system epss
scoring_elements 0.78164
published_at 2026-04-01T12:55:00Z
2
value 0.01118
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-02T12:55:00Z
3
value 0.01118
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-04T12:55:00Z
4
value 0.01118
scoring_system epss
scoring_elements 0.78185
published_at 2026-04-07T12:55:00Z
5
value 0.01118
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-08T12:55:00Z
6
value 0.01118
scoring_system epss
scoring_elements 0.78217
published_at 2026-04-09T12:55:00Z
7
value 0.01118
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-11T12:55:00Z
8
value 0.01118
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-12T12:55:00Z
9
value 0.01118
scoring_system epss
scoring_elements 0.78222
published_at 2026-04-13T12:55:00Z
10
value 0.01118
scoring_system epss
scoring_elements 0.78254
published_at 2026-04-16T12:55:00Z
11
value 0.01118
scoring_system epss
scoring_elements 0.78252
published_at 2026-04-18T12:55:00Z
12
value 0.01118
scoring_system epss
scoring_elements 0.78249
published_at 2026-04-21T12:55:00Z
13
value 0.01118
scoring_system epss
scoring_elements 0.78281
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3703
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703
8
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
9
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
12
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
13
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=639356
reference_id 639356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=639356
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3703
reference_id CVE-2010-3703
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3703
52
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
53
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
54
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2010-3703
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yej-ag45-uuga
5
url VCID-5r8r-hhhf-e3as
vulnerability_id VCID-5r8r-hhhf-e3as
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0165
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82526
published_at 2026-04-01T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-02T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-04T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82551
published_at 2026-04-07T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.82577
published_at 2026-04-08T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-09T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82603
published_at 2026-04-11T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-12T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.8259
published_at 2026-04-13T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-16T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82627
published_at 2026-04-18T12:55:00Z
11
value 0.01757
scoring_system epss
scoring_elements 0.82631
published_at 2026-04-21T12:55:00Z
12
value 0.01757
scoring_system epss
scoring_elements 0.82652
published_at 2026-04-24T12:55:00Z
13
value 0.01757
scoring_system epss
scoring_elements 0.82662
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0165
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
3
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
4
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-0165
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5r8r-hhhf-e3as
6
url VCID-65sa-tagy-3ybs
vulnerability_id VCID-65sa-tagy-3ybs
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76549
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76577
published_at 2026-04-04T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76558
published_at 2026-04-07T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.7659
published_at 2026-04-08T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76601
published_at 2026-04-09T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-11T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76607
published_at 2026-04-12T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-13T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76639
published_at 2026-04-16T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-18T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.76631
published_at 2026-04-21T12:55:00Z
12
value 0.00968
scoring_system epss
scoring_elements 0.76663
published_at 2026-04-24T12:55:00Z
13
value 0.00968
scoring_system epss
scoring_elements 0.76669
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495886
reference_id 495886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495886
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-0799
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs
7
url VCID-68rw-a4ah-5khm
vulnerability_id VCID-68rw-a4ah-5khm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
reference_id
reference_type
scores
0
value 0.07101
scoring_system epss
scoring_elements 0.91487
published_at 2026-04-01T12:55:00Z
1
value 0.07101
scoring_system epss
scoring_elements 0.91493
published_at 2026-04-02T12:55:00Z
2
value 0.07101
scoring_system epss
scoring_elements 0.915
published_at 2026-04-04T12:55:00Z
3
value 0.07101
scoring_system epss
scoring_elements 0.91508
published_at 2026-04-07T12:55:00Z
4
value 0.07101
scoring_system epss
scoring_elements 0.91521
published_at 2026-04-08T12:55:00Z
5
value 0.07101
scoring_system epss
scoring_elements 0.91527
published_at 2026-04-09T12:55:00Z
6
value 0.07101
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-11T12:55:00Z
7
value 0.07101
scoring_system epss
scoring_elements 0.91533
published_at 2026-04-12T12:55:00Z
8
value 0.07101
scoring_system epss
scoring_elements 0.91531
published_at 2026-04-13T12:55:00Z
9
value 0.07101
scoring_system epss
scoring_elements 0.91554
published_at 2026-04-16T12:55:00Z
10
value 0.07101
scoring_system epss
scoring_elements 0.91549
published_at 2026-04-21T12:55:00Z
11
value 0.07101
scoring_system epss
scoring_elements 0.91557
published_at 2026-04-24T12:55:00Z
12
value 0.07101
scoring_system epss
scoring_elements 0.91555
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495896
reference_id 495896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495896
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-1182
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm
8
url VCID-6b75-d741-vufk
vulnerability_id VCID-6b75-d741-vufk
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91
1
reference_url http://j00ru.vexillium.org/?p=1507
reference_id
reference_type
scores
url http://j00ru.vexillium.org/?p=1507
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1790.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1790.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1790
reference_id
reference_type
scores
0
value 0.02786
scoring_system epss
scoring_elements 0.86121
published_at 2026-04-26T12:55:00Z
1
value 0.02786
scoring_system epss
scoring_elements 0.86012
published_at 2026-04-01T12:55:00Z
2
value 0.02786
scoring_system epss
scoring_elements 0.86023
published_at 2026-04-02T12:55:00Z
3
value 0.02786
scoring_system epss
scoring_elements 0.86039
published_at 2026-04-07T12:55:00Z
4
value 0.02786
scoring_system epss
scoring_elements 0.86059
published_at 2026-04-08T12:55:00Z
5
value 0.02786
scoring_system epss
scoring_elements 0.86069
published_at 2026-04-09T12:55:00Z
6
value 0.02786
scoring_system epss
scoring_elements 0.86083
published_at 2026-04-11T12:55:00Z
7
value 0.02786
scoring_system epss
scoring_elements 0.8608
published_at 2026-04-12T12:55:00Z
8
value 0.02786
scoring_system epss
scoring_elements 0.86076
published_at 2026-04-13T12:55:00Z
9
value 0.02786
scoring_system epss
scoring_elements 0.86093
published_at 2026-04-16T12:55:00Z
10
value 0.02786
scoring_system epss
scoring_elements 0.86098
published_at 2026-04-18T12:55:00Z
11
value 0.02786
scoring_system epss
scoring_elements 0.86091
published_at 2026-04-21T12:55:00Z
12
value 0.02786
scoring_system epss
scoring_elements 0.86111
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1790
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790
7
reference_url http://secunia.com/advisories/52846
reference_id
reference_type
scores
url http://secunia.com/advisories/52846
8
reference_url http://ubuntu.com/usn/usn-1785-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-1785-1
9
reference_url http://www.debian.org/security/2013/dsa-2719
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2719
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:143
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:143
11
reference_url http://www.openwall.com/lists/oss-security/2013/02/28/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/28/4
12
reference_url http://www.openwall.com/lists/oss-security/2013/02/28/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/28/8
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071
reference_id 702071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=917111
reference_id 917111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=917111
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1790
reference_id CVE-2013-1790
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1790
17
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
18
reference_url https://usn.ubuntu.com/1785-1/
reference_id USN-1785-1
reference_type
scores
url https://usn.ubuntu.com/1785-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2013-1790
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6b75-d741-vufk
9
url VCID-6dwz-8kx9-rugr
vulnerability_id VCID-6dwz-8kx9-rugr
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3603
reference_id
reference_type
scores
0
value 0.06276
scoring_system epss
scoring_elements 0.90877
published_at 2026-04-01T12:55:00Z
1
value 0.06276
scoring_system epss
scoring_elements 0.90882
published_at 2026-04-02T12:55:00Z
2
value 0.06276
scoring_system epss
scoring_elements 0.90892
published_at 2026-04-04T12:55:00Z
3
value 0.06276
scoring_system epss
scoring_elements 0.90902
published_at 2026-04-07T12:55:00Z
4
value 0.06276
scoring_system epss
scoring_elements 0.90913
published_at 2026-04-08T12:55:00Z
5
value 0.06276
scoring_system epss
scoring_elements 0.9092
published_at 2026-04-09T12:55:00Z
6
value 0.06276
scoring_system epss
scoring_elements 0.90928
published_at 2026-04-13T12:55:00Z
7
value 0.06276
scoring_system epss
scoring_elements 0.90929
published_at 2026-04-12T12:55:00Z
8
value 0.06276
scoring_system epss
scoring_elements 0.90952
published_at 2026-04-16T12:55:00Z
9
value 0.06276
scoring_system epss
scoring_elements 0.9095
published_at 2026-04-18T12:55:00Z
10
value 0.06276
scoring_system epss
scoring_elements 0.90951
published_at 2026-04-21T12:55:00Z
11
value 0.06276
scoring_system epss
scoring_elements 0.90963
published_at 2026-04-24T12:55:00Z
12
value 0.06276
scoring_system epss
scoring_elements 0.90962
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526915
reference_id 526915
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526915
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
8
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
9
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-3603
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwz-8kx9-rugr
10
url VCID-8nj9-hqay-dfdj
vulnerability_id VCID-8nj9-hqay-dfdj
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3938.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3938
reference_id
reference_type
scores
0
value 0.03449
scoring_system epss
scoring_elements 0.87454
published_at 2026-04-01T12:55:00Z
1
value 0.03449
scoring_system epss
scoring_elements 0.87464
published_at 2026-04-02T12:55:00Z
2
value 0.03449
scoring_system epss
scoring_elements 0.87478
published_at 2026-04-04T12:55:00Z
3
value 0.03449
scoring_system epss
scoring_elements 0.8748
published_at 2026-04-07T12:55:00Z
4
value 0.03449
scoring_system epss
scoring_elements 0.875
published_at 2026-04-08T12:55:00Z
5
value 0.03449
scoring_system epss
scoring_elements 0.87506
published_at 2026-04-09T12:55:00Z
6
value 0.03449
scoring_system epss
scoring_elements 0.87517
published_at 2026-04-11T12:55:00Z
7
value 0.03449
scoring_system epss
scoring_elements 0.87512
published_at 2026-04-12T12:55:00Z
8
value 0.03449
scoring_system epss
scoring_elements 0.87509
published_at 2026-04-13T12:55:00Z
9
value 0.03449
scoring_system epss
scoring_elements 0.87524
published_at 2026-04-21T12:55:00Z
10
value 0.03449
scoring_system epss
scoring_elements 0.87525
published_at 2026-04-18T12:55:00Z
11
value 0.03449
scoring_system epss
scoring_elements 0.87539
published_at 2026-04-24T12:55:00Z
12
value 0.03449
scoring_system epss
scoring_elements 0.87546
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3938
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680
reference_id 534680
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=537471
reference_id 537471
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=537471
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-3938
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8nj9-hqay-dfdj
11
url VCID-9yxn-jhqm-hbhv
vulnerability_id VCID-9yxn-jhqm-hbhv
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492
2
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696
3
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959
4
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888
5
reference_url http://j00ru.vexillium.org/?p=1507
reference_id
reference_type
scores
url http://j00ru.vexillium.org/?p=1507
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1788.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1788.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1788
reference_id
reference_type
scores
0
value 0.04145
scoring_system epss
scoring_elements 0.88689
published_at 2026-04-26T12:55:00Z
1
value 0.04145
scoring_system epss
scoring_elements 0.88605
published_at 2026-04-01T12:55:00Z
2
value 0.04145
scoring_system epss
scoring_elements 0.88614
published_at 2026-04-02T12:55:00Z
3
value 0.04145
scoring_system epss
scoring_elements 0.8863
published_at 2026-04-04T12:55:00Z
4
value 0.04145
scoring_system epss
scoring_elements 0.88631
published_at 2026-04-07T12:55:00Z
5
value 0.04145
scoring_system epss
scoring_elements 0.8865
published_at 2026-04-08T12:55:00Z
6
value 0.04145
scoring_system epss
scoring_elements 0.88654
published_at 2026-04-09T12:55:00Z
7
value 0.04145
scoring_system epss
scoring_elements 0.88667
published_at 2026-04-11T12:55:00Z
8
value 0.04145
scoring_system epss
scoring_elements 0.8866
published_at 2026-04-13T12:55:00Z
9
value 0.04145
scoring_system epss
scoring_elements 0.88673
published_at 2026-04-16T12:55:00Z
10
value 0.04145
scoring_system epss
scoring_elements 0.8867
published_at 2026-04-18T12:55:00Z
11
value 0.04145
scoring_system epss
scoring_elements 0.88668
published_at 2026-04-21T12:55:00Z
12
value 0.04145
scoring_system epss
scoring_elements 0.88683
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1788
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788
11
reference_url http://secunia.com/advisories/52846
reference_id
reference_type
scores
url http://secunia.com/advisories/52846
12
reference_url http://ubuntu.com/usn/usn-1785-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-1785-1
13
reference_url http://www.debian.org/security/2013/dsa-2719
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2719
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:143
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:143
15
reference_url http://www.openwall.com/lists/oss-security/2013/02/28/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/28/4
16
reference_url http://www.openwall.com/lists/oss-security/2013/02/28/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/28/8
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071
reference_id 702071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=917108
reference_id 917108
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=917108
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1788
reference_id CVE-2013-1788
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1788
21
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
22
reference_url https://usn.ubuntu.com/1785-1/
reference_id USN-1785-1
reference_type
scores
url https://usn.ubuntu.com/1785-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2013-1788
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9yxn-jhqm-hbhv
12
url VCID-ctb2-8h4y-vybd
vulnerability_id VCID-ctb2-8h4y-vybd
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
reference_id
reference_type
scores
0
value 0.0519
scoring_system epss
scoring_elements 0.8988
published_at 2026-04-01T12:55:00Z
1
value 0.0519
scoring_system epss
scoring_elements 0.89883
published_at 2026-04-02T12:55:00Z
2
value 0.0519
scoring_system epss
scoring_elements 0.89895
published_at 2026-04-04T12:55:00Z
3
value 0.0519
scoring_system epss
scoring_elements 0.899
published_at 2026-04-07T12:55:00Z
4
value 0.0519
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-08T12:55:00Z
5
value 0.0519
scoring_system epss
scoring_elements 0.89922
published_at 2026-04-09T12:55:00Z
6
value 0.0519
scoring_system epss
scoring_elements 0.89929
published_at 2026-04-11T12:55:00Z
7
value 0.0519
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-12T12:55:00Z
8
value 0.0519
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-13T12:55:00Z
9
value 0.0519
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-16T12:55:00Z
10
value 0.0519
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-18T12:55:00Z
11
value 0.0519
scoring_system epss
scoring_elements 0.89931
published_at 2026-04-21T12:55:00Z
12
value 0.0519
scoring_system epss
scoring_elements 0.89947
published_at 2026-04-24T12:55:00Z
13
value 0.0519
scoring_system epss
scoring_elements 0.89946
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490625
reference_id 490625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490625
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-0166
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd
13
url VCID-ctdw-25y5-8kdm
vulnerability_id VCID-ctdw-25y5-8kdm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
reference_id
reference_type
scores
0
value 0.09017
scoring_system epss
scoring_elements 0.92595
published_at 2026-04-01T12:55:00Z
1
value 0.09017
scoring_system epss
scoring_elements 0.92601
published_at 2026-04-02T12:55:00Z
2
value 0.09017
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-04T12:55:00Z
3
value 0.09017
scoring_system epss
scoring_elements 0.92608
published_at 2026-04-07T12:55:00Z
4
value 0.09017
scoring_system epss
scoring_elements 0.92619
published_at 2026-04-08T12:55:00Z
5
value 0.09017
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-09T12:55:00Z
6
value 0.09017
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-13T12:55:00Z
7
value 0.09017
scoring_system epss
scoring_elements 0.92642
published_at 2026-04-16T12:55:00Z
8
value 0.09017
scoring_system epss
scoring_elements 0.92641
published_at 2026-04-18T12:55:00Z
9
value 0.09017
scoring_system epss
scoring_elements 0.92645
published_at 2026-04-21T12:55:00Z
10
value 0.09017
scoring_system epss
scoring_elements 0.92647
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
6
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
7
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
8
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
9
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
10
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
11
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
12
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
13
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-0195
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm
14
url VCID-czzu-9vw8-wbb2
vulnerability_id VCID-czzu-9vw8-wbb2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2
2
reference_url http://j00ru.vexillium.org/?p=1507
reference_id
reference_type
scores
url http://j00ru.vexillium.org/?p=1507
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1789.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1789.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1789
reference_id
reference_type
scores
0
value 0.02846
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-26T12:55:00Z
1
value 0.02846
scoring_system epss
scoring_elements 0.86157
published_at 2026-04-01T12:55:00Z
2
value 0.02846
scoring_system epss
scoring_elements 0.86167
published_at 2026-04-02T12:55:00Z
3
value 0.02846
scoring_system epss
scoring_elements 0.86181
published_at 2026-04-07T12:55:00Z
4
value 0.02846
scoring_system epss
scoring_elements 0.862
published_at 2026-04-08T12:55:00Z
5
value 0.02846
scoring_system epss
scoring_elements 0.86212
published_at 2026-04-09T12:55:00Z
6
value 0.02846
scoring_system epss
scoring_elements 0.86226
published_at 2026-04-11T12:55:00Z
7
value 0.02846
scoring_system epss
scoring_elements 0.86223
published_at 2026-04-12T12:55:00Z
8
value 0.02846
scoring_system epss
scoring_elements 0.86219
published_at 2026-04-13T12:55:00Z
9
value 0.02846
scoring_system epss
scoring_elements 0.86237
published_at 2026-04-16T12:55:00Z
10
value 0.02846
scoring_system epss
scoring_elements 0.86243
published_at 2026-04-18T12:55:00Z
11
value 0.02846
scoring_system epss
scoring_elements 0.86234
published_at 2026-04-21T12:55:00Z
12
value 0.02846
scoring_system epss
scoring_elements 0.86255
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1789
7
reference_url http://secunia.com/advisories/52846
reference_id
reference_type
scores
url http://secunia.com/advisories/52846
8
reference_url http://ubuntu.com/usn/usn-1785-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-1785-1
9
reference_url http://www.openwall.com/lists/oss-security/2013/02/28/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/28/4
10
reference_url http://www.openwall.com/lists/oss-security/2013/02/28/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/28/8
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=917109
reference_id 917109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=917109
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1789
reference_id CVE-2013-1789
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1789
14
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
15
reference_url https://usn.ubuntu.com/1785-1/
reference_id USN-1785-1
reference_type
scores
url https://usn.ubuntu.com/1785-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2013-1789
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-czzu-9vw8-wbb2
15
url VCID-dgb8-nes9-8fb7
vulnerability_id VCID-dgb8-nes9-8fb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
reference_id
reference_type
scores
0
value 0.02384
scoring_system epss
scoring_elements 0.84926
published_at 2026-04-01T12:55:00Z
1
value 0.02384
scoring_system epss
scoring_elements 0.8494
published_at 2026-04-02T12:55:00Z
2
value 0.02384
scoring_system epss
scoring_elements 0.84959
published_at 2026-04-04T12:55:00Z
3
value 0.02384
scoring_system epss
scoring_elements 0.84963
published_at 2026-04-07T12:55:00Z
4
value 0.02384
scoring_system epss
scoring_elements 0.84986
published_at 2026-04-08T12:55:00Z
5
value 0.02384
scoring_system epss
scoring_elements 0.84993
published_at 2026-04-09T12:55:00Z
6
value 0.02384
scoring_system epss
scoring_elements 0.85008
published_at 2026-04-11T12:55:00Z
7
value 0.02384
scoring_system epss
scoring_elements 0.85006
published_at 2026-04-12T12:55:00Z
8
value 0.02384
scoring_system epss
scoring_elements 0.85003
published_at 2026-04-13T12:55:00Z
9
value 0.02384
scoring_system epss
scoring_elements 0.85024
published_at 2026-04-16T12:55:00Z
10
value 0.02384
scoring_system epss
scoring_elements 0.85026
published_at 2026-04-18T12:55:00Z
11
value 0.02384
scoring_system epss
scoring_elements 0.85023
published_at 2026-04-21T12:55:00Z
12
value 0.02384
scoring_system epss
scoring_elements 0.85048
published_at 2026-04-24T12:55:00Z
13
value 0.02384
scoring_system epss
scoring_elements 0.85056
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490614
reference_id 490614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490614
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-0147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7
16
url VCID-gbm8-vcwy-u3g2
vulnerability_id VCID-gbm8-vcwy-u3g2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
reference_id
reference_type
scores
0
value 0.27841
scoring_system epss
scoring_elements 0.96426
published_at 2026-04-01T12:55:00Z
1
value 0.27841
scoring_system epss
scoring_elements 0.96433
published_at 2026-04-02T12:55:00Z
2
value 0.27841
scoring_system epss
scoring_elements 0.96437
published_at 2026-04-04T12:55:00Z
3
value 0.27841
scoring_system epss
scoring_elements 0.9644
published_at 2026-04-07T12:55:00Z
4
value 0.27841
scoring_system epss
scoring_elements 0.96449
published_at 2026-04-08T12:55:00Z
5
value 0.27841
scoring_system epss
scoring_elements 0.96452
published_at 2026-04-09T12:55:00Z
6
value 0.27841
scoring_system epss
scoring_elements 0.96456
published_at 2026-04-11T12:55:00Z
7
value 0.27841
scoring_system epss
scoring_elements 0.96457
published_at 2026-04-12T12:55:00Z
8
value 0.27841
scoring_system epss
scoring_elements 0.96459
published_at 2026-04-13T12:55:00Z
9
value 0.27841
scoring_system epss
scoring_elements 0.96466
published_at 2026-04-16T12:55:00Z
10
value 0.27841
scoring_system epss
scoring_elements 0.9647
published_at 2026-04-18T12:55:00Z
11
value 0.27841
scoring_system epss
scoring_elements 0.96473
published_at 2026-04-21T12:55:00Z
12
value 0.27841
scoring_system epss
scoring_elements 0.96474
published_at 2026-04-24T12:55:00Z
13
value 0.27841
scoring_system epss
scoring_elements 0.96475
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495889
reference_id 495889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495889
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-1179
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2
17
url VCID-gc6w-tctk-nycd
vulnerability_id VCID-gc6w-tctk-nycd
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json
1
reference_url https://access.redhat.com/security/cve/cve-2010-4653
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2010-4653
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4653
reference_id
reference_type
scores
0
value 0.00782
scoring_system epss
scoring_elements 0.73809
published_at 2026-04-26T12:55:00Z
1
value 0.00782
scoring_system epss
scoring_elements 0.738
published_at 2026-04-24T12:55:00Z
2
value 0.00782
scoring_system epss
scoring_elements 0.73677
published_at 2026-04-01T12:55:00Z
3
value 0.00782
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-02T12:55:00Z
4
value 0.00782
scoring_system epss
scoring_elements 0.73709
published_at 2026-04-04T12:55:00Z
5
value 0.00782
scoring_system epss
scoring_elements 0.73682
published_at 2026-04-07T12:55:00Z
6
value 0.00782
scoring_system epss
scoring_elements 0.73717
published_at 2026-04-08T12:55:00Z
7
value 0.00782
scoring_system epss
scoring_elements 0.73729
published_at 2026-04-09T12:55:00Z
8
value 0.00782
scoring_system epss
scoring_elements 0.73751
published_at 2026-04-11T12:55:00Z
9
value 0.00782
scoring_system epss
scoring_elements 0.73733
published_at 2026-04-12T12:55:00Z
10
value 0.00782
scoring_system epss
scoring_elements 0.73724
published_at 2026-04-13T12:55:00Z
11
value 0.00782
scoring_system epss
scoring_elements 0.73767
published_at 2026-04-16T12:55:00Z
12
value 0.00782
scoring_system epss
scoring_elements 0.73775
published_at 2026-04-18T12:55:00Z
13
value 0.00782
scoring_system epss
scoring_elements 0.73766
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4653
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653
5
reference_url http://security.gentoo.org/glsa/glsa-201310-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201310-03.xml
6
reference_url https://security-tracker.debian.org/tracker/CVE-2010-4653
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2010-4653
7
reference_url http://www.securityfocus.com/bid/45948
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45948
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672165
reference_id 672165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672165
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4653
reference_id CVE-2010-4653
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-4653
14
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2010-4653
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gc6w-tctk-nycd
18
url VCID-jvuz-2phs-87du
vulnerability_id VCID-jvuz-2phs-87du
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
reference_id
reference_type
scores
0
value 0.08831
scoring_system epss
scoring_elements 0.92498
published_at 2026-04-01T12:55:00Z
1
value 0.08831
scoring_system epss
scoring_elements 0.92504
published_at 2026-04-02T12:55:00Z
2
value 0.08831
scoring_system epss
scoring_elements 0.92512
published_at 2026-04-04T12:55:00Z
3
value 0.08831
scoring_system epss
scoring_elements 0.92514
published_at 2026-04-07T12:55:00Z
4
value 0.08831
scoring_system epss
scoring_elements 0.92526
published_at 2026-04-08T12:55:00Z
5
value 0.08831
scoring_system epss
scoring_elements 0.9253
published_at 2026-04-09T12:55:00Z
6
value 0.08831
scoring_system epss
scoring_elements 0.92537
published_at 2026-04-13T12:55:00Z
7
value 0.08831
scoring_system epss
scoring_elements 0.92538
published_at 2026-04-12T12:55:00Z
8
value 0.08831
scoring_system epss
scoring_elements 0.92547
published_at 2026-04-18T12:55:00Z
9
value 0.08831
scoring_system epss
scoring_elements 0.92549
published_at 2026-04-21T12:55:00Z
10
value 0.08831
scoring_system epss
scoring_elements 0.92551
published_at 2026-04-24T12:55:00Z
11
value 0.08831
scoring_system epss
scoring_elements 0.92552
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495892
reference_id 495892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495892
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-1180
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du
19
url VCID-neqs-cg1p-7bb7
vulnerability_id VCID-neqs-cg1p-7bb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3702
reference_id
reference_type
scores
0
value 0.02916
scoring_system epss
scoring_elements 0.86424
published_at 2026-04-26T12:55:00Z
1
value 0.02916
scoring_system epss
scoring_elements 0.86316
published_at 2026-04-01T12:55:00Z
2
value 0.02916
scoring_system epss
scoring_elements 0.86326
published_at 2026-04-02T12:55:00Z
3
value 0.02916
scoring_system epss
scoring_elements 0.86345
published_at 2026-04-04T12:55:00Z
4
value 0.02916
scoring_system epss
scoring_elements 0.86346
published_at 2026-04-07T12:55:00Z
5
value 0.02916
scoring_system epss
scoring_elements 0.86364
published_at 2026-04-08T12:55:00Z
6
value 0.02916
scoring_system epss
scoring_elements 0.86374
published_at 2026-04-09T12:55:00Z
7
value 0.02916
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-11T12:55:00Z
8
value 0.02916
scoring_system epss
scoring_elements 0.86385
published_at 2026-04-12T12:55:00Z
9
value 0.02916
scoring_system epss
scoring_elements 0.8638
published_at 2026-04-13T12:55:00Z
10
value 0.02916
scoring_system epss
scoring_elements 0.86397
published_at 2026-04-16T12:55:00Z
11
value 0.02916
scoring_system epss
scoring_elements 0.86402
published_at 2026-04-18T12:55:00Z
12
value 0.02916
scoring_system epss
scoring_elements 0.86395
published_at 2026-04-21T12:55:00Z
13
value 0.02916
scoring_system epss
scoring_elements 0.86415
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3702
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
15
reference_url http://secunia.com/advisories/42141
reference_id
reference_type
scores
url http://secunia.com/advisories/42141
16
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
17
reference_url http://secunia.com/advisories/42397
reference_id
reference_type
scores
url http://secunia.com/advisories/42397
18
reference_url http://secunia.com/advisories/42691
reference_id
reference_type
scores
url http://secunia.com/advisories/42691
19
reference_url http://secunia.com/advisories/43079
reference_id
reference_type
scores
url http://secunia.com/advisories/43079
20
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
21
reference_url http://www.debian.org/security/2010/dsa-2119
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2119
22
reference_url http://www.debian.org/security/2010/dsa-2135
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2135
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
28
reference_url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
29
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
30
reference_url http://www.redhat.com/support/errata/RHSA-2010-0749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0749.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2010-0750.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0750.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2010-0751.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0751.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2010-0752.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0752.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2010-0753.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0753.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2010-0754.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0754.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2010-0755.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0755.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
38
reference_url http://www.securityfocus.com/bid/43845
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43845
39
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
40
reference_url http://www.vupen.com/english/advisories/2010/2897
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2897
41
reference_url http://www.vupen.com/english/advisories/2010/3097
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3097
42
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=595245
reference_id 595245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=595245
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3702
reference_id CVE-2010-3702
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3702
75
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
76
reference_url https://security.gentoo.org/glsa/201402-17
reference_id GLSA-201402-17
reference_type
scores
url https://security.gentoo.org/glsa/201402-17
77
reference_url https://access.redhat.com/errata/RHSA-2010:0749
reference_id RHSA-2010:0749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0749
78
reference_url https://access.redhat.com/errata/RHSA-2010:0750
reference_id RHSA-2010:0750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0750
79
reference_url https://access.redhat.com/errata/RHSA-2010:0751
reference_id RHSA-2010:0751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0751
80
reference_url https://access.redhat.com/errata/RHSA-2010:0752
reference_id RHSA-2010:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0752
81
reference_url https://access.redhat.com/errata/RHSA-2010:0753
reference_id RHSA-2010:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0753
82
reference_url https://access.redhat.com/errata/RHSA-2010:0754
reference_id RHSA-2010:0754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0754
83
reference_url https://access.redhat.com/errata/RHSA-2010:0755
reference_id RHSA-2010:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0755
84
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
85
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
86
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2010-3702
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-neqs-cg1p-7bb7
20
url VCID-ng15-dzek-kyda
vulnerability_id VCID-ng15-dzek-kyda
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3607.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3607
reference_id
reference_type
scores
0
value 0.06855
scoring_system epss
scoring_elements 0.91315
published_at 2026-04-01T12:55:00Z
1
value 0.06855
scoring_system epss
scoring_elements 0.91319
published_at 2026-04-02T12:55:00Z
2
value 0.06855
scoring_system epss
scoring_elements 0.9133
published_at 2026-04-04T12:55:00Z
3
value 0.06855
scoring_system epss
scoring_elements 0.91337
published_at 2026-04-07T12:55:00Z
4
value 0.06855
scoring_system epss
scoring_elements 0.91349
published_at 2026-04-08T12:55:00Z
5
value 0.06855
scoring_system epss
scoring_elements 0.91356
published_at 2026-04-09T12:55:00Z
6
value 0.06855
scoring_system epss
scoring_elements 0.91363
published_at 2026-04-11T12:55:00Z
7
value 0.06855
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-12T12:55:00Z
8
value 0.06855
scoring_system epss
scoring_elements 0.91365
published_at 2026-04-13T12:55:00Z
9
value 0.06855
scoring_system epss
scoring_elements 0.9139
published_at 2026-04-21T12:55:00Z
10
value 0.06855
scoring_system epss
scoring_elements 0.91388
published_at 2026-04-18T12:55:00Z
11
value 0.06855
scoring_system epss
scoring_elements 0.914
published_at 2026-04-24T12:55:00Z
12
value 0.06855
scoring_system epss
scoring_elements 0.91398
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526924
reference_id 526924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526924
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
6
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
7
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-3607
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ng15-dzek-kyda
21
url VCID-ngzc-42z2-8yae
vulnerability_id VCID-ngzc-42z2-8yae
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2142.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2142.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2142
reference_id
reference_type
scores
0
value 0.00397
scoring_system epss
scoring_elements 0.60505
published_at 2026-04-24T12:55:00Z
1
value 0.00397
scoring_system epss
scoring_elements 0.60519
published_at 2026-04-26T12:55:00Z
2
value 0.01333
scoring_system epss
scoring_elements 0.79941
published_at 2026-04-04T12:55:00Z
3
value 0.01333
scoring_system epss
scoring_elements 0.7993
published_at 2026-04-07T12:55:00Z
4
value 0.01333
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-08T12:55:00Z
5
value 0.01333
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-09T12:55:00Z
6
value 0.01333
scoring_system epss
scoring_elements 0.79914
published_at 2026-04-01T12:55:00Z
7
value 0.01333
scoring_system epss
scoring_elements 0.79971
published_at 2026-04-12T12:55:00Z
8
value 0.01333
scoring_system epss
scoring_elements 0.79963
published_at 2026-04-13T12:55:00Z
9
value 0.01333
scoring_system epss
scoring_elements 0.79991
published_at 2026-04-18T12:55:00Z
10
value 0.01333
scoring_system epss
scoring_elements 0.79994
published_at 2026-04-21T12:55:00Z
11
value 0.01333
scoring_system epss
scoring_elements 0.79988
published_at 2026-04-11T12:55:00Z
12
value 0.01333
scoring_system epss
scoring_elements 0.79921
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2142
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487773
reference_id 487773
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487773
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=789936
reference_id 789936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=789936
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2012-2142
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngzc-42z2-8yae
22
url VCID-rm6a-c4rf-f7hc
vulnerability_id VCID-rm6a-c4rf-f7hc
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
reference_id
reference_type
scores
0
value 0.08985
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-01T12:55:00Z
1
value 0.08985
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-02T12:55:00Z
2
value 0.08985
scoring_system epss
scoring_elements 0.92587
published_at 2026-04-04T12:55:00Z
3
value 0.08985
scoring_system epss
scoring_elements 0.92588
published_at 2026-04-07T12:55:00Z
4
value 0.08985
scoring_system epss
scoring_elements 0.926
published_at 2026-04-08T12:55:00Z
5
value 0.08985
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-09T12:55:00Z
6
value 0.08985
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-13T12:55:00Z
7
value 0.08985
scoring_system epss
scoring_elements 0.92611
published_at 2026-04-12T12:55:00Z
8
value 0.08985
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-16T12:55:00Z
9
value 0.08985
scoring_system epss
scoring_elements 0.92623
published_at 2026-04-18T12:55:00Z
10
value 0.08985
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-21T12:55:00Z
11
value 0.08985
scoring_system epss
scoring_elements 0.92628
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495887
reference_id 495887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495887
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-0800
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc
23
url VCID-uczb-yext-6yfq
vulnerability_id VCID-uczb-yext-6yfq
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1188
reference_id
reference_type
scores
0
value 0.21975
scoring_system epss
scoring_elements 0.95736
published_at 2026-04-01T12:55:00Z
1
value 0.21975
scoring_system epss
scoring_elements 0.95745
published_at 2026-04-02T12:55:00Z
2
value 0.21975
scoring_system epss
scoring_elements 0.95753
published_at 2026-04-04T12:55:00Z
3
value 0.21975
scoring_system epss
scoring_elements 0.95755
published_at 2026-04-07T12:55:00Z
4
value 0.21975
scoring_system epss
scoring_elements 0.95764
published_at 2026-04-08T12:55:00Z
5
value 0.21975
scoring_system epss
scoring_elements 0.95767
published_at 2026-04-09T12:55:00Z
6
value 0.21975
scoring_system epss
scoring_elements 0.95771
published_at 2026-04-12T12:55:00Z
7
value 0.21975
scoring_system epss
scoring_elements 0.95772
published_at 2026-04-13T12:55:00Z
8
value 0.21975
scoring_system epss
scoring_elements 0.95781
published_at 2026-04-16T12:55:00Z
9
value 0.21975
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-18T12:55:00Z
10
value 0.21975
scoring_system epss
scoring_elements 0.95787
published_at 2026-04-21T12:55:00Z
11
value 0.21975
scoring_system epss
scoring_elements 0.95789
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1188
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495907
reference_id 495907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495907
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779
reference_id 575779
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-1188
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uczb-yext-6yfq
24
url VCID-uny2-k19n-1bb2
vulnerability_id VCID-uny2-k19n-1bb2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
reference_id
reference_type
scores
0
value 0.02433
scoring_system epss
scoring_elements 0.85086
published_at 2026-04-01T12:55:00Z
1
value 0.02433
scoring_system epss
scoring_elements 0.85098
published_at 2026-04-02T12:55:00Z
2
value 0.02433
scoring_system epss
scoring_elements 0.85116
published_at 2026-04-04T12:55:00Z
3
value 0.02433
scoring_system epss
scoring_elements 0.85119
published_at 2026-04-07T12:55:00Z
4
value 0.02433
scoring_system epss
scoring_elements 0.85141
published_at 2026-04-08T12:55:00Z
5
value 0.02433
scoring_system epss
scoring_elements 0.85148
published_at 2026-04-09T12:55:00Z
6
value 0.02433
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-11T12:55:00Z
7
value 0.02433
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-12T12:55:00Z
8
value 0.02433
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-13T12:55:00Z
9
value 0.02433
scoring_system epss
scoring_elements 0.85177
published_at 2026-04-21T12:55:00Z
10
value 0.02433
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-18T12:55:00Z
11
value 0.02433
scoring_system epss
scoring_elements 0.852
published_at 2026-04-24T12:55:00Z
12
value 0.02433
scoring_system epss
scoring_elements 0.85209
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495894
reference_id 495894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495894
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-1181
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2
25
url VCID-vudr-8rrg-hufx
vulnerability_id VCID-vudr-8rrg-hufx
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
reference_id
reference_type
scores
0
value 0.01703
scoring_system epss
scoring_elements 0.82232
published_at 2026-04-01T12:55:00Z
1
value 0.01703
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-02T12:55:00Z
2
value 0.01703
scoring_system epss
scoring_elements 0.82264
published_at 2026-04-04T12:55:00Z
3
value 0.01703
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-07T12:55:00Z
4
value 0.01703
scoring_system epss
scoring_elements 0.82285
published_at 2026-04-08T12:55:00Z
5
value 0.01703
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-09T12:55:00Z
6
value 0.01703
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-11T12:55:00Z
7
value 0.01703
scoring_system epss
scoring_elements 0.82306
published_at 2026-04-12T12:55:00Z
8
value 0.01703
scoring_system epss
scoring_elements 0.823
published_at 2026-04-13T12:55:00Z
9
value 0.01703
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-18T12:55:00Z
10
value 0.01703
scoring_system epss
scoring_elements 0.82337
published_at 2026-04-21T12:55:00Z
11
value 0.01703
scoring_system epss
scoring_elements 0.82358
published_at 2026-04-24T12:55:00Z
12
value 0.01703
scoring_system epss
scoring_elements 0.82368
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495899
reference_id 495899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495899
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-1183
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx
26
url VCID-xddx-numk-a7bn
vulnerability_id VCID-xddx-numk-a7bn
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3608
reference_id
reference_type
scores
0
value 0.12664
scoring_system epss
scoring_elements 0.93944
published_at 2026-04-01T12:55:00Z
1
value 0.12664
scoring_system epss
scoring_elements 0.93953
published_at 2026-04-02T12:55:00Z
2
value 0.12664
scoring_system epss
scoring_elements 0.93962
published_at 2026-04-04T12:55:00Z
3
value 0.12664
scoring_system epss
scoring_elements 0.93964
published_at 2026-04-07T12:55:00Z
4
value 0.12664
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-08T12:55:00Z
5
value 0.12664
scoring_system epss
scoring_elements 0.93976
published_at 2026-04-09T12:55:00Z
6
value 0.12664
scoring_system epss
scoring_elements 0.9398
published_at 2026-04-13T12:55:00Z
7
value 0.12664
scoring_system epss
scoring_elements 0.93995
published_at 2026-04-16T12:55:00Z
8
value 0.12664
scoring_system epss
scoring_elements 0.94
published_at 2026-04-18T12:55:00Z
9
value 0.12664
scoring_system epss
scoring_elements 0.94001
published_at 2026-04-21T12:55:00Z
10
value 0.12664
scoring_system epss
scoring_elements 0.94003
published_at 2026-04-24T12:55:00Z
11
value 0.12664
scoring_system epss
scoring_elements 0.94002
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526637
reference_id 526637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526637
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
8
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
9
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
10
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://access.redhat.com/errata/RHSA-2009:1513
reference_id RHSA-2009:1513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1513
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
15
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-3608
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xddx-numk-a7bn
27
url VCID-ynvq-nzrq-9bca
vulnerability_id VCID-ynvq-nzrq-9bca
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
reference_id
reference_type
scores
0
value 0.01745
scoring_system epss
scoring_elements 0.8246
published_at 2026-04-01T12:55:00Z
1
value 0.01745
scoring_system epss
scoring_elements 0.82474
published_at 2026-04-02T12:55:00Z
2
value 0.01745
scoring_system epss
scoring_elements 0.82491
published_at 2026-04-04T12:55:00Z
3
value 0.01745
scoring_system epss
scoring_elements 0.82488
published_at 2026-04-07T12:55:00Z
4
value 0.01745
scoring_system epss
scoring_elements 0.82514
published_at 2026-04-08T12:55:00Z
5
value 0.01745
scoring_system epss
scoring_elements 0.82521
published_at 2026-04-09T12:55:00Z
6
value 0.01745
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-11T12:55:00Z
7
value 0.01745
scoring_system epss
scoring_elements 0.82536
published_at 2026-04-12T12:55:00Z
8
value 0.01745
scoring_system epss
scoring_elements 0.82531
published_at 2026-04-13T12:55:00Z
9
value 0.01745
scoring_system epss
scoring_elements 0.82568
published_at 2026-04-18T12:55:00Z
10
value 0.01745
scoring_system epss
scoring_elements 0.82572
published_at 2026-04-21T12:55:00Z
11
value 0.01745
scoring_system epss
scoring_elements 0.82594
published_at 2026-04-24T12:55:00Z
12
value 0.01745
scoring_system epss
scoring_elements 0.82604
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-0146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca
28
url VCID-yu46-ypr2-dfce
vulnerability_id VCID-yu46-ypr2-dfce
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3609
reference_id
reference_type
scores
0
value 0.05999
scoring_system epss
scoring_elements 0.90645
published_at 2026-04-01T12:55:00Z
1
value 0.05999
scoring_system epss
scoring_elements 0.9065
published_at 2026-04-02T12:55:00Z
2
value 0.05999
scoring_system epss
scoring_elements 0.9066
published_at 2026-04-04T12:55:00Z
3
value 0.05999
scoring_system epss
scoring_elements 0.90669
published_at 2026-04-07T12:55:00Z
4
value 0.05999
scoring_system epss
scoring_elements 0.90679
published_at 2026-04-08T12:55:00Z
5
value 0.05999
scoring_system epss
scoring_elements 0.90685
published_at 2026-04-09T12:55:00Z
6
value 0.05999
scoring_system epss
scoring_elements 0.90694
published_at 2026-04-12T12:55:00Z
7
value 0.05999
scoring_system epss
scoring_elements 0.9069
published_at 2026-04-13T12:55:00Z
8
value 0.05999
scoring_system epss
scoring_elements 0.90709
published_at 2026-04-16T12:55:00Z
9
value 0.05999
scoring_system epss
scoring_elements 0.90707
published_at 2026-04-18T12:55:00Z
10
value 0.05999
scoring_system epss
scoring_elements 0.90704
published_at 2026-04-21T12:55:00Z
11
value 0.05999
scoring_system epss
scoring_elements 0.9072
published_at 2026-04-24T12:55:00Z
12
value 0.05999
scoring_system epss
scoring_elements 0.90721
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3609
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526893
reference_id 526893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526893
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1504
reference_id RHSA-2009:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1504
12
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
13
reference_url https://access.redhat.com/errata/RHSA-2009:1513
reference_id RHSA-2009:1513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1513
14
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
15
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
16
reference_url https://access.redhat.com/errata/RHSA-2010:0401
reference_id RHSA-2010:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0401
17
reference_url https://access.redhat.com/errata/RHSA-2010:0755
reference_id RHSA-2010:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0755
18
reference_url https://usn.ubuntu.com/850-1/
reference_id USN-850-1
reference_type
scores
url https://usn.ubuntu.com/850-1/
19
reference_url https://usn.ubuntu.com/850-3/
reference_id USN-850-3
reference_type
scores
url https://usn.ubuntu.com/850-3/
20
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-3609
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce
29
url VCID-zn54-s7jz-ruh8
vulnerability_id VCID-zn54-s7jz-ruh8
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4654.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4654.json
1
reference_url https://access.redhat.com/security/cve/cve-2010-4654
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2010-4654
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4654
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.6455
published_at 2026-04-26T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64538
published_at 2026-04-24T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64396
published_at 2026-04-01T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.6445
published_at 2026-04-02T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6448
published_at 2026-04-04T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64439
published_at 2026-04-07T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64488
published_at 2026-04-08T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64504
published_at 2026-04-09T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64519
published_at 2026-04-11T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64508
published_at 2026-04-12T12:55:00Z
10
value 0.00468
scoring_system epss
scoring_elements 0.64479
published_at 2026-04-13T12:55:00Z
11
value 0.00468
scoring_system epss
scoring_elements 0.64513
published_at 2026-04-16T12:55:00Z
12
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-18T12:55:00Z
13
value 0.00468
scoring_system epss
scoring_elements 0.64517
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4654
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654
5
reference_url http://security.gentoo.org/glsa/glsa-201310-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201310-03.xml
6
reference_url https://security-tracker.debian.org/tracker/CVE-2010-4654
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2010-4654
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672181
reference_id 672181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672181
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4654
reference_id CVE-2010-4654
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-4654
13
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2010-4654
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn54-s7jz-ruh8
30
url VCID-zr8n-mfu1-4yg4
vulnerability_id VCID-zr8n-mfu1-4yg4
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3606
reference_id
reference_type
scores
0
value 0.04772
scoring_system epss
scoring_elements 0.8942
published_at 2026-04-01T12:55:00Z
1
value 0.04772
scoring_system epss
scoring_elements 0.89424
published_at 2026-04-02T12:55:00Z
2
value 0.04772
scoring_system epss
scoring_elements 0.89435
published_at 2026-04-04T12:55:00Z
3
value 0.04772
scoring_system epss
scoring_elements 0.89437
published_at 2026-04-07T12:55:00Z
4
value 0.04772
scoring_system epss
scoring_elements 0.89453
published_at 2026-04-08T12:55:00Z
5
value 0.04772
scoring_system epss
scoring_elements 0.89457
published_at 2026-04-09T12:55:00Z
6
value 0.04772
scoring_system epss
scoring_elements 0.89465
published_at 2026-04-11T12:55:00Z
7
value 0.04772
scoring_system epss
scoring_elements 0.89463
published_at 2026-04-12T12:55:00Z
8
value 0.04772
scoring_system epss
scoring_elements 0.89459
published_at 2026-04-13T12:55:00Z
9
value 0.04772
scoring_system epss
scoring_elements 0.89474
published_at 2026-04-18T12:55:00Z
10
value 0.04772
scoring_system epss
scoring_elements 0.89472
published_at 2026-04-21T12:55:00Z
11
value 0.04772
scoring_system epss
scoring_elements 0.89486
published_at 2026-04-24T12:55:00Z
12
value 0.04772
scoring_system epss
scoring_elements 0.8949
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=526877
reference_id 526877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=526877
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
reference_id 551287
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
reference_id 551289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
8
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
9
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
10
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
11
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
12
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:ebuild/app-text/poppler@0.22.2-r1
purl pkg:ebuild/app-text/poppler@0.22.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1
aliases CVE-2009-3606
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr8n-mfu1-4yg4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1