Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
Typedeb
Namespacedebian
Namexpdf
Version3.02-1.4+lenny1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.02-2
Latest_non_vulnerable_version3.04+git20260220-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5r8r-hhhf-e3as
vulnerability_id VCID-5r8r-hhhf-e3as
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0165
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82526
published_at 2026-04-01T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-02T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-04T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82551
published_at 2026-04-07T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.82577
published_at 2026-04-08T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-09T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82603
published_at 2026-04-11T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-12T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.8259
published_at 2026-04-13T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-16T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82627
published_at 2026-04-18T12:55:00Z
11
value 0.01757
scoring_system epss
scoring_elements 0.82631
published_at 2026-04-21T12:55:00Z
12
value 0.01757
scoring_system epss
scoring_elements 0.82652
published_at 2026-04-24T12:55:00Z
13
value 0.01757
scoring_system epss
scoring_elements 0.82662
published_at 2026-04-26T12:55:00Z
14
value 0.01757
scoring_system epss
scoring_elements 0.82668
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0165
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
3
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
4
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-0165
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5r8r-hhhf-e3as
1
url VCID-65sa-tagy-3ybs
vulnerability_id VCID-65sa-tagy-3ybs
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76549
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76577
published_at 2026-04-04T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76558
published_at 2026-04-07T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.7659
published_at 2026-04-08T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76601
published_at 2026-04-09T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-11T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76607
published_at 2026-04-12T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-13T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76639
published_at 2026-04-16T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-18T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.76631
published_at 2026-04-21T12:55:00Z
12
value 0.00968
scoring_system epss
scoring_elements 0.76663
published_at 2026-04-24T12:55:00Z
13
value 0.00968
scoring_system epss
scoring_elements 0.76669
published_at 2026-04-26T12:55:00Z
14
value 0.00968
scoring_system epss
scoring_elements 0.76682
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495886
reference_id 495886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495886
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-0799
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs
2
url VCID-68rw-a4ah-5khm
vulnerability_id VCID-68rw-a4ah-5khm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
reference_id
reference_type
scores
0
value 0.07101
scoring_system epss
scoring_elements 0.91487
published_at 2026-04-01T12:55:00Z
1
value 0.07101
scoring_system epss
scoring_elements 0.91493
published_at 2026-04-02T12:55:00Z
2
value 0.07101
scoring_system epss
scoring_elements 0.915
published_at 2026-04-04T12:55:00Z
3
value 0.07101
scoring_system epss
scoring_elements 0.91508
published_at 2026-04-07T12:55:00Z
4
value 0.07101
scoring_system epss
scoring_elements 0.91521
published_at 2026-04-08T12:55:00Z
5
value 0.07101
scoring_system epss
scoring_elements 0.91527
published_at 2026-04-09T12:55:00Z
6
value 0.07101
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-11T12:55:00Z
7
value 0.07101
scoring_system epss
scoring_elements 0.91533
published_at 2026-04-12T12:55:00Z
8
value 0.07101
scoring_system epss
scoring_elements 0.91531
published_at 2026-04-13T12:55:00Z
9
value 0.07101
scoring_system epss
scoring_elements 0.91554
published_at 2026-04-29T12:55:00Z
10
value 0.07101
scoring_system epss
scoring_elements 0.91549
published_at 2026-04-21T12:55:00Z
11
value 0.07101
scoring_system epss
scoring_elements 0.91557
published_at 2026-04-24T12:55:00Z
12
value 0.07101
scoring_system epss
scoring_elements 0.91555
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495896
reference_id 495896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495896
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-1182
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm
3
url VCID-ctb2-8h4y-vybd
vulnerability_id VCID-ctb2-8h4y-vybd
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
reference_id
reference_type
scores
0
value 0.0519
scoring_system epss
scoring_elements 0.8988
published_at 2026-04-01T12:55:00Z
1
value 0.0519
scoring_system epss
scoring_elements 0.89883
published_at 2026-04-02T12:55:00Z
2
value 0.0519
scoring_system epss
scoring_elements 0.89895
published_at 2026-04-04T12:55:00Z
3
value 0.0519
scoring_system epss
scoring_elements 0.899
published_at 2026-04-07T12:55:00Z
4
value 0.0519
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-08T12:55:00Z
5
value 0.0519
scoring_system epss
scoring_elements 0.89922
published_at 2026-04-09T12:55:00Z
6
value 0.0519
scoring_system epss
scoring_elements 0.89929
published_at 2026-04-11T12:55:00Z
7
value 0.0519
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-12T12:55:00Z
8
value 0.0519
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-13T12:55:00Z
9
value 0.0519
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-16T12:55:00Z
10
value 0.0519
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-18T12:55:00Z
11
value 0.0519
scoring_system epss
scoring_elements 0.89931
published_at 2026-04-21T12:55:00Z
12
value 0.0519
scoring_system epss
scoring_elements 0.89947
published_at 2026-04-24T12:55:00Z
13
value 0.0519
scoring_system epss
scoring_elements 0.89946
published_at 2026-04-26T12:55:00Z
14
value 0.0519
scoring_system epss
scoring_elements 0.89944
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490625
reference_id 490625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490625
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-0166
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd
4
url VCID-ctdw-25y5-8kdm
vulnerability_id VCID-ctdw-25y5-8kdm
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
reference_id
reference_type
scores
0
value 0.09017
scoring_system epss
scoring_elements 0.92595
published_at 2026-04-01T12:55:00Z
1
value 0.09017
scoring_system epss
scoring_elements 0.92601
published_at 2026-04-02T12:55:00Z
2
value 0.09017
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-04T12:55:00Z
3
value 0.09017
scoring_system epss
scoring_elements 0.92608
published_at 2026-04-07T12:55:00Z
4
value 0.09017
scoring_system epss
scoring_elements 0.92619
published_at 2026-04-08T12:55:00Z
5
value 0.09017
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-09T12:55:00Z
6
value 0.09017
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-13T12:55:00Z
7
value 0.09017
scoring_system epss
scoring_elements 0.92642
published_at 2026-04-16T12:55:00Z
8
value 0.09017
scoring_system epss
scoring_elements 0.92641
published_at 2026-04-18T12:55:00Z
9
value 0.09017
scoring_system epss
scoring_elements 0.92645
published_at 2026-04-21T12:55:00Z
10
value 0.09017
scoring_system epss
scoring_elements 0.92647
published_at 2026-04-26T12:55:00Z
11
value 0.09017
scoring_system epss
scoring_elements 0.92643
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
5
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
6
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
7
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
8
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
9
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
10
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
11
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
12
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
13
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-0195
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm
5
url VCID-dgb8-nes9-8fb7
vulnerability_id VCID-dgb8-nes9-8fb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
reference_id
reference_type
scores
0
value 0.02384
scoring_system epss
scoring_elements 0.84926
published_at 2026-04-01T12:55:00Z
1
value 0.02384
scoring_system epss
scoring_elements 0.8494
published_at 2026-04-02T12:55:00Z
2
value 0.02384
scoring_system epss
scoring_elements 0.84959
published_at 2026-04-04T12:55:00Z
3
value 0.02384
scoring_system epss
scoring_elements 0.84963
published_at 2026-04-07T12:55:00Z
4
value 0.02384
scoring_system epss
scoring_elements 0.84986
published_at 2026-04-08T12:55:00Z
5
value 0.02384
scoring_system epss
scoring_elements 0.84993
published_at 2026-04-09T12:55:00Z
6
value 0.02384
scoring_system epss
scoring_elements 0.85008
published_at 2026-04-11T12:55:00Z
7
value 0.02384
scoring_system epss
scoring_elements 0.85006
published_at 2026-04-12T12:55:00Z
8
value 0.02384
scoring_system epss
scoring_elements 0.85003
published_at 2026-04-13T12:55:00Z
9
value 0.02384
scoring_system epss
scoring_elements 0.85024
published_at 2026-04-16T12:55:00Z
10
value 0.02384
scoring_system epss
scoring_elements 0.85026
published_at 2026-04-18T12:55:00Z
11
value 0.02384
scoring_system epss
scoring_elements 0.85023
published_at 2026-04-21T12:55:00Z
12
value 0.02384
scoring_system epss
scoring_elements 0.85048
published_at 2026-04-24T12:55:00Z
13
value 0.02384
scoring_system epss
scoring_elements 0.85056
published_at 2026-04-26T12:55:00Z
14
value 0.02384
scoring_system epss
scoring_elements 0.85054
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490614
reference_id 490614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490614
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-0147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7
6
url VCID-gbm8-vcwy-u3g2
vulnerability_id VCID-gbm8-vcwy-u3g2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
reference_id
reference_type
scores
0
value 0.27841
scoring_system epss
scoring_elements 0.96426
published_at 2026-04-01T12:55:00Z
1
value 0.27841
scoring_system epss
scoring_elements 0.96433
published_at 2026-04-02T12:55:00Z
2
value 0.27841
scoring_system epss
scoring_elements 0.96437
published_at 2026-04-04T12:55:00Z
3
value 0.27841
scoring_system epss
scoring_elements 0.9644
published_at 2026-04-07T12:55:00Z
4
value 0.27841
scoring_system epss
scoring_elements 0.96449
published_at 2026-04-08T12:55:00Z
5
value 0.27841
scoring_system epss
scoring_elements 0.96452
published_at 2026-04-09T12:55:00Z
6
value 0.27841
scoring_system epss
scoring_elements 0.96456
published_at 2026-04-11T12:55:00Z
7
value 0.27841
scoring_system epss
scoring_elements 0.96457
published_at 2026-04-12T12:55:00Z
8
value 0.27841
scoring_system epss
scoring_elements 0.96459
published_at 2026-04-13T12:55:00Z
9
value 0.27841
scoring_system epss
scoring_elements 0.96466
published_at 2026-04-16T12:55:00Z
10
value 0.27841
scoring_system epss
scoring_elements 0.9647
published_at 2026-04-18T12:55:00Z
11
value 0.27841
scoring_system epss
scoring_elements 0.96473
published_at 2026-04-21T12:55:00Z
12
value 0.27841
scoring_system epss
scoring_elements 0.96474
published_at 2026-04-24T12:55:00Z
13
value 0.27841
scoring_system epss
scoring_elements 0.96475
published_at 2026-04-26T12:55:00Z
14
value 0.27841
scoring_system epss
scoring_elements 0.96477
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495889
reference_id 495889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495889
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-1179
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2
7
url VCID-jvuz-2phs-87du
vulnerability_id VCID-jvuz-2phs-87du
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
reference_id
reference_type
scores
0
value 0.08831
scoring_system epss
scoring_elements 0.92498
published_at 2026-04-01T12:55:00Z
1
value 0.08831
scoring_system epss
scoring_elements 0.92504
published_at 2026-04-02T12:55:00Z
2
value 0.08831
scoring_system epss
scoring_elements 0.92512
published_at 2026-04-04T12:55:00Z
3
value 0.08831
scoring_system epss
scoring_elements 0.92514
published_at 2026-04-07T12:55:00Z
4
value 0.08831
scoring_system epss
scoring_elements 0.92526
published_at 2026-04-08T12:55:00Z
5
value 0.08831
scoring_system epss
scoring_elements 0.9253
published_at 2026-04-09T12:55:00Z
6
value 0.08831
scoring_system epss
scoring_elements 0.92537
published_at 2026-04-13T12:55:00Z
7
value 0.08831
scoring_system epss
scoring_elements 0.92538
published_at 2026-04-12T12:55:00Z
8
value 0.08831
scoring_system epss
scoring_elements 0.92547
published_at 2026-04-18T12:55:00Z
9
value 0.08831
scoring_system epss
scoring_elements 0.92549
published_at 2026-04-21T12:55:00Z
10
value 0.08831
scoring_system epss
scoring_elements 0.92551
published_at 2026-04-24T12:55:00Z
11
value 0.08831
scoring_system epss
scoring_elements 0.92552
published_at 2026-04-26T12:55:00Z
12
value 0.08831
scoring_system epss
scoring_elements 0.92548
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495892
reference_id 495892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495892
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-1180
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du
8
url VCID-rm6a-c4rf-f7hc
vulnerability_id VCID-rm6a-c4rf-f7hc
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
reference_id
reference_type
scores
0
value 0.08985
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-01T12:55:00Z
1
value 0.08985
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-02T12:55:00Z
2
value 0.08985
scoring_system epss
scoring_elements 0.92587
published_at 2026-04-04T12:55:00Z
3
value 0.08985
scoring_system epss
scoring_elements 0.92588
published_at 2026-04-07T12:55:00Z
4
value 0.08985
scoring_system epss
scoring_elements 0.926
published_at 2026-04-08T12:55:00Z
5
value 0.08985
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-09T12:55:00Z
6
value 0.08985
scoring_system epss
scoring_elements 0.9261
published_at 2026-04-13T12:55:00Z
7
value 0.08985
scoring_system epss
scoring_elements 0.92611
published_at 2026-04-12T12:55:00Z
8
value 0.08985
scoring_system epss
scoring_elements 0.92624
published_at 2026-04-29T12:55:00Z
9
value 0.08985
scoring_system epss
scoring_elements 0.92623
published_at 2026-04-18T12:55:00Z
10
value 0.08985
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-21T12:55:00Z
11
value 0.08985
scoring_system epss
scoring_elements 0.92628
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495887
reference_id 495887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495887
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-0800
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc
9
url VCID-uny2-k19n-1bb2
vulnerability_id VCID-uny2-k19n-1bb2
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
reference_id
reference_type
scores
0
value 0.02433
scoring_system epss
scoring_elements 0.85086
published_at 2026-04-01T12:55:00Z
1
value 0.02433
scoring_system epss
scoring_elements 0.85098
published_at 2026-04-02T12:55:00Z
2
value 0.02433
scoring_system epss
scoring_elements 0.85116
published_at 2026-04-04T12:55:00Z
3
value 0.02433
scoring_system epss
scoring_elements 0.85119
published_at 2026-04-07T12:55:00Z
4
value 0.02433
scoring_system epss
scoring_elements 0.85141
published_at 2026-04-08T12:55:00Z
5
value 0.02433
scoring_system epss
scoring_elements 0.85148
published_at 2026-04-09T12:55:00Z
6
value 0.02433
scoring_system epss
scoring_elements 0.85163
published_at 2026-04-11T12:55:00Z
7
value 0.02433
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-12T12:55:00Z
8
value 0.02433
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-13T12:55:00Z
9
value 0.02433
scoring_system epss
scoring_elements 0.85177
published_at 2026-04-21T12:55:00Z
10
value 0.02433
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-18T12:55:00Z
11
value 0.02433
scoring_system epss
scoring_elements 0.852
published_at 2026-04-24T12:55:00Z
12
value 0.02433
scoring_system epss
scoring_elements 0.85209
published_at 2026-04-26T12:55:00Z
13
value 0.02433
scoring_system epss
scoring_elements 0.85207
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495894
reference_id 495894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495894
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
15
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-1181
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2
10
url VCID-vudr-8rrg-hufx
vulnerability_id VCID-vudr-8rrg-hufx
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
reference_id
reference_type
scores
0
value 0.01703
scoring_system epss
scoring_elements 0.82232
published_at 2026-04-01T12:55:00Z
1
value 0.01703
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-02T12:55:00Z
2
value 0.01703
scoring_system epss
scoring_elements 0.82264
published_at 2026-04-04T12:55:00Z
3
value 0.01703
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-07T12:55:00Z
4
value 0.01703
scoring_system epss
scoring_elements 0.82285
published_at 2026-04-08T12:55:00Z
5
value 0.01703
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-09T12:55:00Z
6
value 0.01703
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-11T12:55:00Z
7
value 0.01703
scoring_system epss
scoring_elements 0.82306
published_at 2026-04-12T12:55:00Z
8
value 0.01703
scoring_system epss
scoring_elements 0.823
published_at 2026-04-13T12:55:00Z
9
value 0.01703
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-18T12:55:00Z
10
value 0.01703
scoring_system epss
scoring_elements 0.82337
published_at 2026-04-21T12:55:00Z
11
value 0.01703
scoring_system epss
scoring_elements 0.82358
published_at 2026-04-24T12:55:00Z
12
value 0.01703
scoring_system epss
scoring_elements 0.82368
published_at 2026-04-26T12:55:00Z
13
value 0.01703
scoring_system epss
scoring_elements 0.82373
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495899
reference_id 495899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495899
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
7
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
8
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
9
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
10
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
11
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-1183
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx
11
url VCID-ynvq-nzrq-9bca
vulnerability_id VCID-ynvq-nzrq-9bca
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
reference_id
reference_type
scores
0
value 0.01745
scoring_system epss
scoring_elements 0.8246
published_at 2026-04-01T12:55:00Z
1
value 0.01745
scoring_system epss
scoring_elements 0.82474
published_at 2026-04-02T12:55:00Z
2
value 0.01745
scoring_system epss
scoring_elements 0.82491
published_at 2026-04-04T12:55:00Z
3
value 0.01745
scoring_system epss
scoring_elements 0.82488
published_at 2026-04-07T12:55:00Z
4
value 0.01745
scoring_system epss
scoring_elements 0.82514
published_at 2026-04-08T12:55:00Z
5
value 0.01745
scoring_system epss
scoring_elements 0.82521
published_at 2026-04-09T12:55:00Z
6
value 0.01745
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-11T12:55:00Z
7
value 0.01745
scoring_system epss
scoring_elements 0.82536
published_at 2026-04-12T12:55:00Z
8
value 0.01745
scoring_system epss
scoring_elements 0.82531
published_at 2026-04-13T12:55:00Z
9
value 0.01745
scoring_system epss
scoring_elements 0.82568
published_at 2026-04-18T12:55:00Z
10
value 0.01745
scoring_system epss
scoring_elements 0.82572
published_at 2026-04-21T12:55:00Z
11
value 0.01745
scoring_system epss
scoring_elements 0.82594
published_at 2026-04-24T12:55:00Z
12
value 0.01745
scoring_system epss
scoring_elements 0.82604
published_at 2026-04-26T12:55:00Z
13
value 0.01745
scoring_system epss
scoring_elements 0.8261
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490612
reference_id 490612
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490612
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
reference_id 524806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
reference_id 524809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809
6
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
7
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
8
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
9
reference_url https://access.redhat.com/errata/RHSA-2009:0430
reference_id RHSA-2009:0430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0430
10
reference_url https://access.redhat.com/errata/RHSA-2009:0431
reference_id RHSA-2009:0431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0431
11
reference_url https://access.redhat.com/errata/RHSA-2009:0458
reference_id RHSA-2009:0458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0458
12
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
13
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
14
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
15
reference_url https://usn.ubuntu.com/759-1/
reference_id USN-759-1
reference_type
scores
url https://usn.ubuntu.com/759-1/
16
reference_url https://usn.ubuntu.com/973-1/
reference_id USN-973-1
reference_type
scores
url https://usn.ubuntu.com/973-1/
fixed_packages
0
url pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
purl pkg:deb/debian/xpdf@3.02-1.4%2Blenny1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie
1
url pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20210103-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20210103-3%3Fdistro=trixie
2
url pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20220601-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20220601-1%3Fdistro=trixie
3
url pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20250304-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20250304-1%3Fdistro=trixie
4
url pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
purl pkg:deb/debian/xpdf@3.04%2Bgit20260220-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.04%252Bgit20260220-1%3Fdistro=trixie
aliases CVE-2009-0146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xpdf@3.02-1.4%252Blenny1%3Fdistro=trixie