Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/71816?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "type": "ebuild", "namespace": "app-text", "name": "poppler", "version": "0.22.2-r1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "0.24.5", "latest_non_vulnerable_version": "25.06.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31238?format=api", "vulnerability_id": "VCID-35b2-jj1x-rkcf", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91751", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.9176", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91766", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91773", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91785", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91795", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91793", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91812", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91805", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91806", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91808", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91822", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07495", "scoring_system": "epss", "scoring_elements": "0.91832", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526911", "reference_id": "526911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526911" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-3604" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35b2-jj1x-rkcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31239?format=api", "vulnerability_id": "VCID-3eaw-7xrw-tkft", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3605.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3605.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3605", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.88942", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.8895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.88966", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.88969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.88987", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.88992", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.89004", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.89", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.88998", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.89012", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.8901", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.89005", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.89022", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.8903", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.89033", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.8904", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04392", "scoring_system": "epss", "scoring_elements": "0.89055", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3605" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840", "reference_id": "491840", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-3605" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3eaw-7xrw-tkft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31247?format=api", "vulnerability_id": "VCID-4128-ep6n-hufz", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3704", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.8051", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80338", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80345", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80365", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80354", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80382", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80392", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80411", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80418", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.8042", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80423", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80449", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80455", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80473", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01395", "scoring_system": "epss", "scoring_elements": "0.80488", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704" }, { "reference_url": "http://secunia.com/advisories/42141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42141" }, { "reference_url": "http://secunia.com/advisories/42357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42357" }, { "reference_url": "http://secunia.com/advisories/42397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42397" }, { "reference_url": "http://secunia.com/advisories/42691", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42691" }, { "reference_url": "http://secunia.com/advisories/43079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43079" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2119" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2135", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2135" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "reference_url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/04/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "reference_url": "http://www.securityfocus.com/bid/43841", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/43841" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1005-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165", "reference_id": "599165", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960", "reference_id": "638960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704", "reference_id": "CVE-2010-3704", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://security.gentoo.org/glsa/201402-17", "reference_id": "GLSA-201402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0749", "reference_id": "RHSA-2010:0749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0751", "reference_id": "RHSA-2010:0751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0751" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0752", "reference_id": "RHSA-2010:0752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0753", "reference_id": "RHSA-2010:0753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0753" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0859", "reference_id": "RHSA-2010:0859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201", "reference_id": "RHSA-2012:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "reference_url": "https://usn.ubuntu.com/1005-1/", "reference_id": "USN-1005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1005-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2010-3704" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4128-ep6n-hufz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31235?format=api", "vulnerability_id": "VCID-4jfu-4w71-g7bt", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97303", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97309", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97314", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97322", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97324", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97325", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97326", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97334", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97338", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97339", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97342", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97345", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97351", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1187" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495906", "reference_id": "495906", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495906" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-1187" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jfu-4w71-g7bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31246?format=api", "vulnerability_id": "VCID-4yej-ag45-uuga", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78341", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78164", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78203", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78226", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78222", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78252", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78249", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78281", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78286", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78302", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01118", "scoring_system": "epss", "scoring_elements": "0.78316", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703" }, { "reference_url": "http://secunia.com/advisories/42357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42357" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/04/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1005-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165", "reference_id": "599165", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=639356", "reference_id": "639356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639356" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3703", "reference_id": "CVE-2010-3703", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3703" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0859", "reference_id": "RHSA-2010:0859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0859" }, { "reference_url": "https://usn.ubuntu.com/1005-1/", "reference_id": "USN-1005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1005-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2010-3703" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4yej-ag45-uuga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31224?format=api", "vulnerability_id": "VCID-5r8r-hhhf-e3as", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0165", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82526", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82551", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82596", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8259", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82631", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82662", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82668", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82686", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82707", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-0165" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5r8r-hhhf-e3as" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31227?format=api", "vulnerability_id": "VCID-65sa-tagy-3ybs", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0799", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76577", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76601", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76643", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76631", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76663", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76669", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76682", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.767", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0799" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495886", "reference_id": "495886", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495886" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-0799" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31233?format=api", "vulnerability_id": "VCID-68rw-a4ah-5khm", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91521", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91532", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91533", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91554", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91549", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91557", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91555", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91567", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.9158", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495896", "reference_id": "495896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495896" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-1182" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31254?format=api", "vulnerability_id": "VCID-6b75-d741-vufk", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91" }, { "reference_url": "http://j00ru.vexillium.org/?p=1507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://j00ru.vexillium.org/?p=1507" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1790.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1790.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1790", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86162", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86012", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86023", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86039", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86059", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86069", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.8608", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86093", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86098", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86091", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86111", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86121", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02786", "scoring_system": "epss", "scoring_elements": "0.86141", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790" }, { "reference_url": "http://secunia.com/advisories/52846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/52846" }, { "reference_url": "http://ubuntu.com/usn/usn-1785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-1785-1" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2719" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/28/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/28/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/28/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/28/8" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071", "reference_id": "702071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=917111", "reference_id": "917111", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917111" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1790", "reference_id": "CVE-2013-1790", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1790" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://usn.ubuntu.com/1785-1/", "reference_id": "USN-1785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2013-1790" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6b75-d741-vufk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31237?format=api", "vulnerability_id": "VCID-6dwz-8kx9-rugr", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90877", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90892", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90902", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90913", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.9092", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90928", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90929", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90952", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.9095", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90951", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90963", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90962", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90959", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90975", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06276", "scoring_system": "epss", "scoring_elements": "0.90991", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526915", "reference_id": "526915", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526915" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1504", "reference_id": "RHSA-2009:1504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1504" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-3603" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwz-8kx9-rugr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31244?format=api", "vulnerability_id": "VCID-8nj9-hqay-dfdj", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3938.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3938.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3938", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87464", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87478", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.8748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.875", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87506", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87517", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87512", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87509", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87524", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87539", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87546", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87545", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87558", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03449", "scoring_system": "epss", "scoring_elements": "0.87572", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3938" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680", "reference_id": "534680", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=537471", "reference_id": "537471", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537471" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-3938" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8nj9-hqay-dfdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31251?format=api", "vulnerability_id": "VCID-9yxn-jhqm-hbhv", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888" }, { "reference_url": "http://j00ru.vexillium.org/?p=1507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://j00ru.vexillium.org/?p=1507" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1788.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88715", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.8863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88631", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.8865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88654", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.8866", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88673", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.8867", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88668", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88683", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88689", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88688", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04145", "scoring_system": "epss", "scoring_elements": "0.88699", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788" }, { "reference_url": "http://secunia.com/advisories/52846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/52846" }, { "reference_url": "http://ubuntu.com/usn/usn-1785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-1785-1" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2719" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:143" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/28/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/28/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/28/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/28/8" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071", "reference_id": "702071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=917108", "reference_id": "917108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917108" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1788", "reference_id": "CVE-2013-1788", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1788" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://usn.ubuntu.com/1785-1/", "reference_id": "USN-1785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2013-1788" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yxn-jhqm-hbhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31225?format=api", "vulnerability_id": "VCID-ctb2-8h4y-vybd", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8988", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89916", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89927", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89934", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89931", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89947", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89946", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89944", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89958", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89973", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490625", "reference_id": "490625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490625" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-0166" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31226?format=api", "vulnerability_id": "VCID-ctdw-25y5-8kdm", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0195", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92595", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92601", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92607", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92629", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92642", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92641", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92645", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92647", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92643", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92653", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09017", "scoring_system": "epss", "scoring_elements": "0.92665", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612", "reference_id": "490612", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-0195" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31252?format=api", "vulnerability_id": "VCID-czzu-9vw8-wbb2", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2" }, { "reference_url": "http://j00ru.vexillium.org/?p=1507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://j00ru.vexillium.org/?p=1507" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1789.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1789.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1789", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86304", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86167", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86181", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.862", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86212", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86223", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86237", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86243", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86234", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86255", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86264", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02846", "scoring_system": "epss", "scoring_elements": "0.86283", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1789" }, { "reference_url": "http://secunia.com/advisories/52846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/52846" }, { "reference_url": "http://ubuntu.com/usn/usn-1785-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-1785-1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/28/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/28/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/28/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/28/8" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=917109", "reference_id": "917109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917109" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1789", "reference_id": "CVE-2013-1789", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1789" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://usn.ubuntu.com/1785-1/", "reference_id": "USN-1785-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1785-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2013-1789" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czzu-9vw8-wbb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31223?format=api", "vulnerability_id": "VCID-dgb8-nes9-8fb7", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.8494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84959", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85008", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85023", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85048", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85056", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85054", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85071", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85095", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490614", "reference_id": "490614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490614" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-0147" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31230?format=api", "vulnerability_id": "VCID-gbm8-vcwy-u3g2", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1179", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96426", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96433", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.9644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96456", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96457", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.9647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96473", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96474", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96475", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96477", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96484", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96486", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889", "reference_id": "495889", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-1179" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31248?format=api", "vulnerability_id": "VCID-gc6w-tctk-nycd", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2010-4653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2010-4653" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4653", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73829", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73802", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73677", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73709", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73682", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73717", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73729", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73751", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73724", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73767", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73775", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73766", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.738", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00782", "scoring_system": "epss", "scoring_elements": "0.73809", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4653" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201310-03.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201310-03.xml" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2010-4653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2010-4653" }, { "reference_url": "http://www.securityfocus.com/bid/45948", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45948" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=672165", "reference_id": "672165", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672165" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4653", "reference_id": "CVE-2010-4653", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4653" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2010-4653" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gc6w-tctk-nycd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31231?format=api", "vulnerability_id": "VCID-jvuz-2phs-87du", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92498", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92526", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.9253", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92538", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92547", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92549", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92551", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92552", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92548", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92558", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.9257", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495892", "reference_id": "495892", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495892" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-1180" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31245?format=api", "vulnerability_id": "VCID-neqs-cg1p-7bb7", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "reference_url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3702", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86461", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86326", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86345", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86364", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86374", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86387", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86385", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.8638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86397", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86402", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86395", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86415", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86424", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86421", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02916", "scoring_system": "epss", "scoring_elements": "0.86441", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" }, { "reference_url": "http://secunia.com/advisories/42141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42141" }, { "reference_url": "http://secunia.com/advisories/42357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42357" }, { "reference_url": "http://secunia.com/advisories/42397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42397" }, { "reference_url": "http://secunia.com/advisories/42691", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42691" }, { "reference_url": "http://secunia.com/advisories/43079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43079" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2119", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2119" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2135", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2135" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "reference_url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/04/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "reference_url": "http://www.securityfocus.com/bid/43845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/43845" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1005-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0230", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245", "reference_id": "595245", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165", "reference_id": "599165", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "reference_id": "CVE-2010-3702", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://security.gentoo.org/glsa/201402-17", "reference_id": "GLSA-201402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0749", "reference_id": "RHSA-2010:0749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0750", "reference_id": "RHSA-2010:0750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0751", "reference_id": "RHSA-2010:0751", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0751" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0752", "reference_id": "RHSA-2010:0752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0753", "reference_id": "RHSA-2010:0753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0753" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0754", "reference_id": "RHSA-2010:0754", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0754" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0755", "reference_id": "RHSA-2010:0755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0859", "reference_id": "RHSA-2010:0859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1201", "reference_id": "RHSA-2012:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "reference_url": "https://usn.ubuntu.com/1005-1/", "reference_id": "USN-1005-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1005-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2010-3702" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-neqs-cg1p-7bb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31241?format=api", "vulnerability_id": "VCID-ng15-dzek-kyda", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3607.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3607.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3607", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91315", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91319", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.9133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91337", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.9139", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91388", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.914", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91398", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91397", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91412", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06855", "scoring_system": "epss", "scoring_elements": "0.91427", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526924", "reference_id": "526924", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526924" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-3607" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ng15-dzek-kyda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31250?format=api", "vulnerability_id": "VCID-ngzc-42z2-8yae", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2142.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60505", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60519", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60507", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60465", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60512", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79968", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79971", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79914", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79994", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79921", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79941", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.7993", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79959", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487773", "reference_id": "487773", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487773" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=789936", "reference_id": "789936", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789936" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2012-2142" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngzc-42z2-8yae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31229?format=api", "vulnerability_id": "VCID-rm6a-c4rf-f7hc", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0800", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92575", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92581", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.926", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92605", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.9261", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92611", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92624", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92623", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92628", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92633", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92645", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0800" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495887", "reference_id": "495887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495887" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-0800" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31236?format=api", "vulnerability_id": "VCID-uczb-yext-6yfq", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1188", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95736", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95745", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95753", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95786", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95787", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95789", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.958", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95802", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495907", "reference_id": "495907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495907" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779", "reference_id": "575779", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-1188" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uczb-yext-6yfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31232?format=api", "vulnerability_id": "VCID-uny2-k19n-1bb2", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85086", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.8516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85177", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85179", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.852", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85209", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85207", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85221", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85247", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495894", "reference_id": "495894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495894" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-1181" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31234?format=api", "vulnerability_id": "VCID-vudr-8rrg-hufx", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82232", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82285", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82312", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82306", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.823", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82337", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82358", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82368", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82373", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82389", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82411", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495899", "reference_id": "495899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495899" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-1183" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31242?format=api", "vulnerability_id": "VCID-xddx-numk-a7bn", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3608", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93944", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93953", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93962", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93973", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93976", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.9398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.93995", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.94", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.94001", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.94003", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.94002", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.9401", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.12664", "scoring_system": "epss", "scoring_elements": "0.94022", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526637", "reference_id": "526637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526637" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1504", "reference_id": "RHSA-2009:1504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1513", "reference_id": "RHSA-2009:1513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1513" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-3608" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xddx-numk-a7bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31221?format=api", "vulnerability_id": "VCID-ynvq-nzrq-9bca", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82514", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82568", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82594", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82604", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8261", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8263", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82651", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612", "reference_id": "490612", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-0146" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31243?format=api", "vulnerability_id": "VCID-yu46-ypr2-dfce", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3609", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9065", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9066", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90669", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90685", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9069", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90709", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90707", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90704", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.9072", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90721", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90717", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90732", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05999", "scoring_system": "epss", "scoring_elements": "0.90751", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526893", "reference_id": "526893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526893" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1504", "reference_id": "RHSA-2009:1504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1513", "reference_id": "RHSA-2009:1513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1513" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0755", "reference_id": "RHSA-2010:0755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0755" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" }, { "reference_url": "https://usn.ubuntu.com/850-3/", "reference_id": "USN-850-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-3/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-3609" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31249?format=api", "vulnerability_id": "VCID-zn54-s7jz-ruh8", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4654.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4654.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2010-4654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2010-4654" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4654", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.6457", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64524", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64396", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.6445", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.6448", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64439", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64488", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64504", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64519", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64508", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64517", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64538", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.6455", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4654" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201310-03.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201310-03.xml" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2010-4654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2010-4654" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=672181", "reference_id": "672181", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672181" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4654", "reference_id": "CVE-2010-4654", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4654" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2010-4654" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zn54-s7jz-ruh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31240?format=api", "vulnerability_id": "VCID-zr8n-mfu1-4yg4", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3606", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.8942", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89457", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89465", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89463", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89474", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89486", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.8949", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89491", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89498", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04772", "scoring_system": "epss", "scoring_elements": "0.89517", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=526877", "reference_id": "526877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526877" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287", "reference_id": "551287", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289", "reference_id": "551289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71816?format=api", "purl": "pkg:ebuild/app-text/poppler@0.22.2-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" } ], "aliases": [ "CVE-2009-3606" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zr8n-mfu1-4yg4" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1" }