Lookup for vulnerable packages by Package URL.

GET /api/packages/582689?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "evince",
    "version": "43.1-2",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "48.1-3",
    "latest_non_vulnerable_version": "49~alpha-2",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42203?format=api",
            "vulnerability_id": "VCID-19yj-kyhq-c7cc",
            "summary": "A vulnerability has been found in Evince which may allow for\n    arbitrary command execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000159.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000159.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57997",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58097",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58073",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58039",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58053",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58038",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5806",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58035",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5809",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58093",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58086",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58066",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58096",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000159"
                },
                {
                    "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=784947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.gnome.org/show_bug.cgi?id=784947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00006.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00013.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00014.html"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2020/Feb/18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://seclists.org/bugtraq/2020/Feb/18"
                },
                {
                    "reference_url": "https://www.debian.org/security/2020/dsa-4624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2020/dsa-4624"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1521210",
                    "reference_id": "1521210",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1521210"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:evince:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000159",
                    "reference_id": "CVE-2017-1000159",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000159"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-15",
                    "reference_id": "GLSA-201804-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-15"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3503-1/",
                    "reference_id": "USN-3503-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3503-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583370?format=api",
                    "purl": "pkg:deb/debian/evince@3.25.92-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.25.92-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000159"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-19yj-kyhq-c7cc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63534?format=api",
            "vulnerability_id": "VCID-8ern-kbeb-j3e2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11459.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11459.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62992",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63051",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6308",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63045",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63096",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63112",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6313",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63116",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63093",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63129",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63136",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63151",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6315",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63117",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11459"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716295",
                    "reference_id": "1716295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716295"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927820",
                    "reference_id": "927820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927820"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927821",
                    "reference_id": "927821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553",
                    "reference_id": "RHSA-2019:3553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1074",
                    "reference_id": "RHSA-2020:1074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1074"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3959-1/",
                    "reference_id": "USN-3959-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3959-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7274-1/",
                    "reference_id": "USN-7274-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7274-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586997?format=api",
                    "purl": "pkg:deb/debian/evince@3.32.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.32.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-11459"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ern-kbeb-j3e2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36573?format=api",
            "vulnerability_id": "VCID-assn-sdbh-6kad",
            "summary": "Multiple vulnerabilities have been found in Evince, allowing remote\n    attackers to execute arbitrary code or cause a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
                },
                {
                    "reference_url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2641.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2641.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92209",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92153",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9216",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92166",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9217",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92181",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92189",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9219",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92198",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92201",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92202",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92199",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42769"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42847"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42872"
                },
                {
                    "reference_url": "http://www.debian.org/security/2011/dsa-2357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2011/dsa-2357"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/45678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/45678"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1024937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1024937"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1035-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1035-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0029"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0043"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0056"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0097"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0102"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534",
                    "reference_id": "609534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=666314",
                    "reference_id": "666314",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666314"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2641",
                    "reference_id": "CVE-2010-2641",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2641"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201111-10",
                    "reference_id": "GLSA-201111-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201111-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0009",
                    "reference_id": "RHSA-2011:0009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0009"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1035-1/",
                    "reference_id": "USN-1035-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1035-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582687?format=api",
                    "purl": "pkg:deb/debian/evince@2.30.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@2.30.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2641"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-assn-sdbh-6kad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36518?format=api",
            "vulnerability_id": "VCID-b1cb-tmbk-83ah",
            "summary": "Multiple vulnerabilities have been discovered in T1Lib, the worst\n    of which could lead to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0433.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0433.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83291",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83122",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83139",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83152",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83176",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83199",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83193",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83189",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83225",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83229",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83251",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8326",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83267",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0433"
                },
                {
                    "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=640923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.gnome.org/show_bug.cgi?id=640923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48985"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
                },
                {
                    "reference_url": "http://xorl.wordpress.com/2011/02/20/cve-2011-0433-evince-linetoken-buffer-overflow/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://xorl.wordpress.com/2011/02/20/cve-2011-0433-evince-linetoken-buffer-overflow/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614668",
                    "reference_id": "614668",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614668"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=679732",
                    "reference_id": "679732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679732"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:evince:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0433",
                    "reference_id": "CVE-2011-0433",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0433"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-57",
                    "reference_id": "GLSA-201701-57",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-57"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0062",
                    "reference_id": "RHSA-2012:0062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0137",
                    "reference_id": "RHSA-2012:0137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0137"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201",
                    "reference_id": "RHSA-2012:1201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1201"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1335-1/",
                    "reference_id": "USN-1335-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1335-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1347-1/",
                    "reference_id": "USN-1347-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1347-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586015?format=api",
                    "purl": "pkg:deb/debian/evince@2.32.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@2.32.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-0433"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b1cb-tmbk-83ah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36517?format=api",
            "vulnerability_id": "VCID-cn18-pfwr-aucd",
            "summary": "Multiple vulnerabilities have been discovered in T1Lib, the worst\n    of which could lead to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
                },
                {
                    "reference_url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2642.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2642.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2642",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9391",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93919",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93931",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9394",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93943",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93946",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.14825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94534",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.14825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94541",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.14825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94513",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.14825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94512",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.14825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94526",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.14825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94531",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.14825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94535",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.14825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94536",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2642"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42769"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42847"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42872"
                },
                {
                    "reference_url": "http://www.debian.org/security/2011/dsa-2357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2011/dsa-2357"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:016"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:017"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/45678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/45678"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1024937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1024937"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1035-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1035-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0029"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0043"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0056"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0097"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0102"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0193"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0194"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534",
                    "reference_id": "609534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318",
                    "reference_id": "666318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:t1lib:t1lib:5.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tug:tetex:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2642",
                    "reference_id": "CVE-2010-2642",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2642"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201111-10",
                    "reference_id": "GLSA-201111-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201111-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-57",
                    "reference_id": "GLSA-201701-57",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-57"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0009",
                    "reference_id": "RHSA-2011:0009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0062",
                    "reference_id": "RHSA-2012:0062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0137",
                    "reference_id": "RHSA-2012:0137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0137"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201",
                    "reference_id": "RHSA-2012:1201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1201"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1035-1/",
                    "reference_id": "USN-1035-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1035-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1335-1/",
                    "reference_id": "USN-1335-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1335-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584380?format=api",
                    "purl": "pkg:deb/debian/evince@3.0.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.0.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2642"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cn18-pfwr-aucd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36574?format=api",
            "vulnerability_id": "VCID-ewyd-gk3z-9ket",
            "summary": "Multiple vulnerabilities have been found in Evince, allowing remote\n    attackers to execute arbitrary code or cause a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
                },
                {
                    "reference_url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2643.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2643.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92017",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91957",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91965",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91973",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91979",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91992",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91995",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91998",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91994",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92013",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9201",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92011",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92005",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2643"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42769"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42847"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42872"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43068"
                },
                {
                    "reference_url": "http://www.debian.org/security/2011/dsa-2357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2011/dsa-2357"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/45678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/45678"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1024937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1024937"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1035-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1035-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0029"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0043"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0056"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0097"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0102"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0212"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534",
                    "reference_id": "609534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=666321",
                    "reference_id": "666321",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666321"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2643",
                    "reference_id": "CVE-2010-2643",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2643"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201111-10",
                    "reference_id": "GLSA-201111-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201111-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0009",
                    "reference_id": "RHSA-2011:0009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0009"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1035-1/",
                    "reference_id": "USN-1035-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1035-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582687?format=api",
                    "purl": "pkg:deb/debian/evince@2.30.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@2.30.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2643"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ewyd-gk3z-9ket"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63535?format=api",
            "vulnerability_id": "VCID-p3a2-3n7h-gugk",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010006.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010006.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1010006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61206",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61613",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61687",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61717",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61688",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61737",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61752",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61774",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61761",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61742",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61784",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6179",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61772",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61767",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61778",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1010006"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730582",
                    "reference_id": "1730582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730582"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4067-1/",
                    "reference_id": "USN-4067-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4067-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7274-1/",
                    "reference_id": "USN-7274-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7274-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586083?format=api",
                    "purl": "pkg:deb/debian/evince@3.27.92-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.27.92-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-1010006"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3a2-3n7h-gugk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36572?format=api",
            "vulnerability_id": "VCID-pxd5-e3jw-2ydu",
            "summary": "Multiple vulnerabilities have been found in Evince, allowing remote\n    attackers to execute arbitrary code or cause a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
                },
                {
                    "reference_url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2640.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2640.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92209",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92153",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9216",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92166",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9217",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92181",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92189",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9219",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92186",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92198",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92201",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92202",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92199",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42769"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42847"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42872"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43068"
                },
                {
                    "reference_url": "http://www.debian.org/security/2011/dsa-2357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2011/dsa-2357"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/45678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/45678"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1024937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1024937"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1035-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1035-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0029"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0043"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0056"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0097"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0102"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0212"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534",
                    "reference_id": "609534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=666313",
                    "reference_id": "666313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666313"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2640",
                    "reference_id": "CVE-2010-2640",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2640"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201111-10",
                    "reference_id": "GLSA-201111-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201111-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0009",
                    "reference_id": "RHSA-2011:0009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0009"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1035-1/",
                    "reference_id": "USN-1035-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1035-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582687?format=api",
                    "purl": "pkg:deb/debian/evince@2.30.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@2.30.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2640"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pxd5-e3jw-2ydu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86663?format=api",
            "vulnerability_id": "VCID-tepn-rswh-ybd9",
            "summary": "evince: Missing check of number of pages leads to segmentation fault",
            "references": [
                {
                    "reference_url": "http://bugzilla.gnome.org/show_bug.cgi?id=701302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugzilla.gnome.org/show_bug.cgi?id=701302"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66654",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66771",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66804",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.668",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6672",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66692",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66741",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66776",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66763",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66733",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66767",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66781",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66765",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6679",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3718"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-3718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-3718"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-3718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-3718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3718"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2013-3718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2013-3718"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1365025",
                    "reference_id": "1365025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1365025"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:3.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:evince:3.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:3.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:3.9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:evince:3.9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:3.9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3718",
                    "reference_id": "CVE-2013-3718",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3718"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583484?format=api",
                    "purl": "pkg:deb/debian/evince@3.10.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.10.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-3718"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tepn-rswh-ybd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63513?format=api",
            "vulnerability_id": "VCID-uvmx-ktr5-jkg2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000083.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000083.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98938",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98963",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98955",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98957",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98958",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9894",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98942",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98944",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98946",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98948",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98949",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98951",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.76668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98952",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000083"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468488",
                    "reference_id": "1468488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468488"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868500",
                    "reference_id": "868500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868500"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201707-14",
                    "reference_id": "ASA-201707-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201707-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-348",
                    "reference_id": "AVG-348",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-348"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45824.txt",
                    "reference_id": "CVE-2017-1000083",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45824.txt"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46341.rb",
                    "reference_id": "CVE-2017-1000083",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46341.rb"
                },
                {
                    "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/0dbad5d2e3c9e9c4cfb6203b99a2b437b18a0105/modules/exploits/multi/fileformat/evince_cbt_cmd_injection.rb",
                    "reference_id": "CVE-2017-1000083",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/0dbad5d2e3c9e9c4cfb6203b99a2b437b18a0105/modules/exploits/multi/fileformat/evince_cbt_cmd_injection.rb"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2388",
                    "reference_id": "RHSA-2017:2388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3351-1/",
                    "reference_id": "USN-3351-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3351-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586568?format=api",
                    "purl": "pkg:deb/debian/evince@3.22.1-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.22.1-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000083"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvmx-ktr5-jkg2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36523?format=api",
            "vulnerability_id": "VCID-uwx5-tjc3-8ka5",
            "summary": "Multiple vulnerabilities have been discovered in T1Lib, the worst\n    of which could lead to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://git.gnome.org/browse/evince/commit/?id=439c5070022e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.gnome.org/browse/evince/commit/?id=439c5070022e"
                },
                {
                    "reference_url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5244.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5244.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82773",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82608",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82623",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82634",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8266",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82667",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82685",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82679",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82674",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82712",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82713",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82716",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82738",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82747",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82753",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5244"
                },
                {
                    "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=643882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.gnome.org/show_bug.cgi?id=643882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5244"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80271"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2011/03/04/21",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2011/03/04/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=878483",
                    "reference_id": "878483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878483"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:evince:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:evince:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5244",
                    "reference_id": "CVE-2011-5244",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5244"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-57",
                    "reference_id": "GLSA-201701-57",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-57"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586015?format=api",
                    "purl": "pkg:deb/debian/evince@2.32.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@2.32.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-5244"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uwx5-tjc3-8ka5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95851?format=api",
            "vulnerability_id": "VCID-v24q-8eqq-17ak",
            "summary": "Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83783",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83684",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83719",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8372",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83721",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83745",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83753",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8376",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83632",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83646",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83648",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83672",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83696",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83689",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51698"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060751",
                    "reference_id": "1060751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060751"
                },
                {
                    "reference_url": "https://github.com/mate-desktop/atril/commit/ce41df6467521ff9fd4f16514ae7d6ebb62eb1ed",
                    "reference_id": "ce41df6467521ff9fd4f16514ae7d6ebb62eb1ed",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-01-23T21:42:27Z/"
                        }
                    ],
                    "url": "https://github.com/mate-desktop/atril/commit/ce41df6467521ff9fd4f16514ae7d6ebb62eb1ed"
                },
                {
                    "reference_url": "https://github.com/mate-desktop/atril/security/advisories/GHSA-34rr-j8v9-v4p2",
                    "reference_id": "GHSA-34rr-j8v9-v4p2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-01-23T21:42:27Z/"
                        }
                    ],
                    "url": "https://github.com/mate-desktop/atril/security/advisories/GHSA-34rr-j8v9-v4p2"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT3UIQOSZ6UNH5QTFOOY2DJ4MITM2C2C/",
                    "reference_id": "OT3UIQOSZ6UNH5QTFOOY2DJ4MITM2C2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-01-23T21:42:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT3UIQOSZ6UNH5QTFOOY2DJ4MITM2C2C/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZKXNZ3HGH6KH65OEKVCEAOZJWNZ32FQ/",
                    "reference_id": "OZKXNZ3HGH6KH65OEKVCEAOZJWNZ32FQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-01-23T21:42:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZKXNZ3HGH6KH65OEKVCEAOZJWNZ32FQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7274-1/",
                    "reference_id": "USN-7274-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7274-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583370?format=api",
                    "purl": "pkg:deb/debian/evince@3.25.92-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.25.92-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-51698"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v24q-8eqq-17ak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35965?format=api",
            "vulnerability_id": "VCID-vws2-991u-bycg",
            "summary": "GNU gv improperly handles user-supplied data possibly allowing for the\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5864.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5864.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96749",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96691",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96701",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96703",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96707",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96715",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96716",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96719",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96722",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96728",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96733",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96736",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96735",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96737",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.30732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9674",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5864"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864"
                },
                {
                    "reference_url": "http://secunia.com/advisories/22787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/22787"
                },
                {
                    "reference_url": "http://secunia.com/advisories/22932",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/22932"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23006"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23018"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23111"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23118"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23183"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23266"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23306",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23306"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23335"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23353"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23409"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23579"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24649",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24649"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24787"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200611-20.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200611-20.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200703-24.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200703-24.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200704-06.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200704-06.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30153",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30153"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30555",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30555"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-850"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/2858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/2858"
                },
                {
                    "reference_url": "http://www.debian.org/security/2006/dsa-1214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2006/dsa-1214"
                },
                {
                    "reference_url": "http://www.debian.org/security/2006/dsa-1243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2006/dsa-1243"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/352825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/352825"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:214"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:229"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2006_26_sr.html"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2006_28_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2006_28_sr.html"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2006_29_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2006_29_sr.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/451057/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/451057/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/451422/100/200/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/451422/100/200/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/452868/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/452868/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/20978",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/20978"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-390-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-390-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-390-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-390-2"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-390-3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-390-3"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/4424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/4424"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/4747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/4747"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=217672",
                    "reference_id": "217672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=217672"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398292",
                    "reference_id": "398292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398292"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=400904",
                    "reference_id": "400904",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=400904"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:gv:3.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:gv:3.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:gv:3.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:gv:3.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5864",
                    "reference_id": "CVE-2006-5864",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5864"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200611-20",
                    "reference_id": "GLSA-200611-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200611-20"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200703-24",
                    "reference_id": "GLSA-200703-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200703-24"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200704-06",
                    "reference_id": "GLSA-200704-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200704-06"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/2858.c",
                    "reference_id": "OSVDB-30274;CVE-2006-5864",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/2858.c"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/390-1/",
                    "reference_id": "USN-390-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/390-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/390-2/",
                    "reference_id": "USN-390-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/390-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/390-3/",
                    "reference_id": "USN-390-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/390-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584766?format=api",
                    "purl": "pkg:deb/debian/evince@0.4.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@0.4.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582688?format=api",
                    "purl": "pkg:deb/debian/evince@3.38.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582689?format=api",
                    "purl": "pkg:deb/debian/evince@43.1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582690?format=api",
                    "purl": "pkg:deb/debian/evince@48.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582691?format=api",
                    "purl": "pkg:deb/debian/evince@49~alpha-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-5864"
            ],
            "risk_score": 9.2,
            "exploitability": "2.0",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vws2-991u-bycg"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"
}