{"url":"http://public2.vulnerablecode.io/api/packages/128533?format=json","purl":"pkg:rpm/redhat/xpdf@1:3.00-20?arch=el4","type":"rpm","namespace":"redhat","name":"xpdf","version":"1:3.00-20","qualifiers":{"arch":"el4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31227?format=json","vulnerability_id":"VCID-65sa-tagy-3ybs","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0799","reference_id":"","reference_type":"","scores":[{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76577","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.767","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76718","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76706","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76725","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76771","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76786","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76795","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495886","reference_id":"495886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495886"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-0799"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31233?format=json","vulnerability_id":"VCID-68rw-a4ah-5khm","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1182","reference_id":"","reference_type":"","scores":[{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91487","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91521","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.9158","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.9159","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91588","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91598","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91606","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91615","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495896","reference_id":"495896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495896"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1182"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31225?format=json","vulnerability_id":"VCID-ctb2-8h4y-vybd","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0166","reference_id":"","reference_type":"","scores":[{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8988","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89946","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89958","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89973","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89985","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8998","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89988","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.90003","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.90012","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.90013","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625","reference_id":"490625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-0166"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31226?format=json","vulnerability_id":"VCID-ctdw-25y5-8kdm","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0195","reference_id":"","reference_type":"","scores":[{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92607","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92629","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92641","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92645","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92647","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92643","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92653","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92676","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92679","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92685","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.9271","published_at":"2026-05-16T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92716","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612","reference_id":"490612","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-0195"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31223?format=json","vulnerability_id":"VCID-dgb8-nes9-8fb7","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0147","reference_id":"","reference_type":"","scores":[{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.8494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85008","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85023","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85054","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85071","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85095","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85112","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85127","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85169","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85173","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614","reference_id":"490614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-0147"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31230?format=json","vulnerability_id":"VCID-gbm8-vcwy-u3g2","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1179","reference_id":"","reference_type":"","scores":[{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96426","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.9644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96457","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.9647","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96473","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96475","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96484","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96486","published_at":"2026-05-07T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96493","published_at":"2026-05-09T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96495","published_at":"2026-05-11T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.965","published_at":"2026-05-12T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.9651","published_at":"2026-05-14T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96512","published_at":"2026-05-15T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96513","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495889","reference_id":"495889","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495889"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1179"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31231?format=json","vulnerability_id":"VCID-jvuz-2phs-87du","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1180","reference_id":"","reference_type":"","scores":[{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92498","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92526","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.9253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92547","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92552","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92558","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.9257","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92579","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92583","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92588","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92613","published_at":"2026-05-14T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92619","published_at":"2026-05-15T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92614","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495892","reference_id":"495892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495892"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1180"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31229?format=json","vulnerability_id":"VCID-rm6a-c4rf-f7hc","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0800","reference_id":"","reference_type":"","scores":[{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92605","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.9261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92628","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92633","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92645","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92657","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92659","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92665","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.9269","published_at":"2026-05-16T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92696","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495887","reference_id":"495887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495887"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-0800"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31232?format=json","vulnerability_id":"VCID-uny2-k19n-1bb2","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1181","reference_id":"","reference_type":"","scores":[{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85086","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85119","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85157","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85207","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85221","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85247","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85266","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85261","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85275","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85311","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85319","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85322","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495894","reference_id":"495894","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495894"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1181"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31234?format=json","vulnerability_id":"VCID-vudr-8rrg-hufx","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1183","reference_id":"","reference_type":"","scores":[{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82232","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82285","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82312","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82335","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82373","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82389","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82411","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.8243","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82447","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82487","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82493","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82495","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495899","reference_id":"495899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495899"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1183"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31221?format=json","vulnerability_id":"VCID-ynvq-nzrq-9bca","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0146","reference_id":"","reference_type":"","scores":[{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82514","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82651","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82671","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8267","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82686","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82727","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82735","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82736","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612","reference_id":"490612","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[],"aliases":["CVE-2009-0146"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca"}],"fixing_vulnerabilities":[],"risk_score":"0.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xpdf@1:3.00-20%3Farch=el4"}