{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","type":"ebuild","namespace":"app-text","name":"poppler","version":"0.22.2-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.24.5","latest_non_vulnerable_version":"25.06.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31238?format=json","vulnerability_id":"VCID-35b2-jj1x-rkcf","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3604","reference_id":"","reference_type":"","scores":[{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.9176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91766","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91806","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91822","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526911","reference_id":"526911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526911"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1500","reference_id":"RHSA-2009:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1503","reference_id":"RHSA-2009:1503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1512","reference_id":"RHSA-2009:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1512"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-3604"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-35b2-jj1x-rkcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31239?format=json","vulnerability_id":"VCID-3eaw-7xrw-tkft","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3605.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3605.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3605","reference_id":"","reference_type":"","scores":[{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.8895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89004","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89012","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.8901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89022","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.8903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89033","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.8904","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89055","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3605"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491840","reference_id":"491840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491840"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-3605"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3eaw-7xrw-tkft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31247?format=json","vulnerability_id":"VCID-4128-ep6n-hufz","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3704","reference_id":"","reference_type":"","scores":[{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.8051","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80338","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80365","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80354","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80382","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80392","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80389","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80418","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.8042","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80423","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80473","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80488","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704"},{"reference_url":"http://secunia.com/advisories/42141","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42141"},{"reference_url":"http://secunia.com/advisories/42357","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42357"},{"reference_url":"http://secunia.com/advisories/42397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42397"},{"reference_url":"http://secunia.com/advisories/42691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42691"},{"reference_url":"http://secunia.com/advisories/43079","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43079"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"},{"reference_url":"http://www.debian.org/security/2010/dsa-2119","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2119"},{"reference_url":"http://www.debian.org/security/2010/dsa-2135","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2135"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/04/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/04/6"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0749.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0749.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0751.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0751.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0752.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0752.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0753.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0753.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html"},{"reference_url":"http://www.securityfocus.com/bid/43841","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43841"},{"reference_url":"http://www.ubuntu.com/usn/USN-1005-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1005-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2897","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2897"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3097","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3097"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0230","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0230"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165","reference_id":"599165","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=638960","reference_id":"638960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=638960"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3704","reference_id":"CVE-2010-3704","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3704"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://security.gentoo.org/glsa/201402-17","reference_id":"GLSA-201402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0749","reference_id":"RHSA-2010:0749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0751","reference_id":"RHSA-2010:0751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0752","reference_id":"RHSA-2010:0752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0753","reference_id":"RHSA-2010:0753","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0859","reference_id":"RHSA-2010:0859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1201","reference_id":"RHSA-2012:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1201"},{"reference_url":"https://usn.ubuntu.com/1005-1/","reference_id":"USN-1005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2010-3704"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4128-ep6n-hufz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31235?format=json","vulnerability_id":"VCID-4jfu-4w71-g7bt","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1187","reference_id":"","reference_type":"","scores":[{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-04-01T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97315","published_at":"2026-04-07T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97324","published_at":"2026-04-11T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97339","published_at":"2026-04-26T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97342","published_at":"2026-04-29T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97345","published_at":"2026-05-05T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97351","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495906","reference_id":"495906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-1187"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4jfu-4w71-g7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31246?format=json","vulnerability_id":"VCID-4yej-ag45-uuga","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3703","reference_id":"","reference_type":"","scores":[{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78341","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78249","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78316","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703"},{"reference_url":"http://secunia.com/advisories/42357","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42357"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/04/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/04/6"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1005-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1005-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165","reference_id":"599165","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=639356","reference_id":"639356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=639356"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3703","reference_id":"CVE-2010-3703","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3703"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0859","reference_id":"RHSA-2010:0859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0859"},{"reference_url":"https://usn.ubuntu.com/1005-1/","reference_id":"USN-1005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2010-3703"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4yej-ag45-uuga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31224?format=json","vulnerability_id":"VCID-5r8r-hhhf-e3as","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0165","reference_id":"","reference_type":"","scores":[{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.8254","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82551","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.8259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82662","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82668","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82686","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82707","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-0165"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5r8r-hhhf-e3as"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31227?format=json","vulnerability_id":"VCID-65sa-tagy-3ybs","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0799","reference_id":"","reference_type":"","scores":[{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76577","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.767","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495886","reference_id":"495886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495886"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-0799"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31233?format=json","vulnerability_id":"VCID-68rw-a4ah-5khm","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1182","reference_id":"","reference_type":"","scores":[{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91487","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91521","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.9158","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495896","reference_id":"495896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495896"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-1182"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31254?format=json","vulnerability_id":"VCID-6b75-d741-vufk","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91"},{"reference_url":"http://j00ru.vexillium.org/?p=1507","reference_id":"","reference_type":"","scores":[],"url":"http://j00ru.vexillium.org/?p=1507"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1790.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1790.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1790","reference_id":"","reference_type":"","scores":[{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86162","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86012","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86039","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86059","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.8608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86098","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86121","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86141","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790"},{"reference_url":"http://secunia.com/advisories/52846","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52846"},{"reference_url":"http://ubuntu.com/usn/usn-1785-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1785-1"},{"reference_url":"http://www.debian.org/security/2013/dsa-2719","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2719"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:143","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:143"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/8"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071","reference_id":"702071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=917111","reference_id":"917111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=917111"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1790","reference_id":"CVE-2013-1790","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1790"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/1785-1/","reference_id":"USN-1785-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1785-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2013-1790"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6b75-d741-vufk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31237?format=json","vulnerability_id":"VCID-6dwz-8kx9-rugr","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3603","reference_id":"","reference_type":"","scores":[{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90892","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.9092","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90928","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90952","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.9095","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90962","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90959","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90975","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90991","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526915","reference_id":"526915","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526915"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1504","reference_id":"RHSA-2009:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1504"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-3603"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwz-8kx9-rugr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31244?format=json","vulnerability_id":"VCID-8nj9-hqay-dfdj","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3938.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3938.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3938","reference_id":"","reference_type":"","scores":[{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87454","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87464","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87478","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.8748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87517","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87546","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87545","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87558","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87572","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680","reference_id":"534680","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=537471","reference_id":"537471","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=537471"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-3938"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8nj9-hqay-dfdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31251?format=json","vulnerability_id":"VCID-9yxn-jhqm-hbhv","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888"},{"reference_url":"http://j00ru.vexillium.org/?p=1507","reference_id":"","reference_type":"","scores":[],"url":"http://j00ru.vexillium.org/?p=1507"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1788.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1788","reference_id":"","reference_type":"","scores":[{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88715","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88614","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.8863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.8865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.8866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88673","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.8867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88689","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88688","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88699","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788"},{"reference_url":"http://secunia.com/advisories/52846","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52846"},{"reference_url":"http://ubuntu.com/usn/usn-1785-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1785-1"},{"reference_url":"http://www.debian.org/security/2013/dsa-2719","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2719"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:143","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:143"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/8"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071","reference_id":"702071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=917108","reference_id":"917108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=917108"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1788","reference_id":"CVE-2013-1788","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1788"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/1785-1/","reference_id":"USN-1785-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1785-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2013-1788"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yxn-jhqm-hbhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31225?format=json","vulnerability_id":"VCID-ctb2-8h4y-vybd","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0166","reference_id":"","reference_type":"","scores":[{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8988","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89946","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89958","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89973","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625","reference_id":"490625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-0166"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31226?format=json","vulnerability_id":"VCID-ctdw-25y5-8kdm","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0195.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0195","reference_id":"","reference_type":"","scores":[{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92607","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92629","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92641","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92645","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92647","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92643","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92653","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09017","scoring_system":"epss","scoring_elements":"0.92665","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612","reference_id":"490612","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-0195"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctdw-25y5-8kdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31252?format=json","vulnerability_id":"VCID-czzu-9vw8-wbb2","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2"},{"reference_url":"http://j00ru.vexillium.org/?p=1507","reference_id":"","reference_type":"","scores":[],"url":"http://j00ru.vexillium.org/?p=1507"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1789.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1789","reference_id":"","reference_type":"","scores":[{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86304","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86167","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86212","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86226","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86237","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86234","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86283","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1789"},{"reference_url":"http://secunia.com/advisories/52846","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52846"},{"reference_url":"http://ubuntu.com/usn/usn-1785-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1785-1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=917109","reference_id":"917109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=917109"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1789","reference_id":"CVE-2013-1789","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1789"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/1785-1/","reference_id":"USN-1785-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1785-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2013-1789"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-czzu-9vw8-wbb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31223?format=json","vulnerability_id":"VCID-dgb8-nes9-8fb7","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0147","reference_id":"","reference_type":"","scores":[{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.8494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85008","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85023","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85054","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85071","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85095","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614","reference_id":"490614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-0147"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31230?format=json","vulnerability_id":"VCID-gbm8-vcwy-u3g2","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1179","reference_id":"","reference_type":"","scores":[{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96426","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.9644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96457","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.9647","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96473","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96475","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96484","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96486","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495889","reference_id":"495889","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495889"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-1179"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31248?format=json","vulnerability_id":"VCID-gc6w-tctk-nycd","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json"},{"reference_url":"https://access.redhat.com/security/cve/cve-2010-4653","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/cve-2010-4653"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4653","reference_id":"","reference_type":"","scores":[{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73829","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73802","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73729","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73766","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.738","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73809","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4653"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201310-03.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201310-03.xml"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2010-4653","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2010-4653"},{"reference_url":"http://www.securityfocus.com/bid/45948","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45948"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=672165","reference_id":"672165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=672165"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4653","reference_id":"CVE-2010-4653","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4653"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2010-4653"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gc6w-tctk-nycd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31231?format=json","vulnerability_id":"VCID-jvuz-2phs-87du","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1180","reference_id":"","reference_type":"","scores":[{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92498","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92526","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.9253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92547","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92552","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92558","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.9257","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495892","reference_id":"495892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495892"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-1180"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31245?format=json","vulnerability_id":"VCID-neqs-cg1p-7bb7","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3702","reference_id":"","reference_type":"","scores":[{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86461","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86345","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86374","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86387","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.8638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86397","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86402","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86415","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86424","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86421","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86441","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702"},{"reference_url":"http://secunia.com/advisories/42141","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42141"},{"reference_url":"http://secunia.com/advisories/42357","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42357"},{"reference_url":"http://secunia.com/advisories/42397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42397"},{"reference_url":"http://secunia.com/advisories/42691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42691"},{"reference_url":"http://secunia.com/advisories/43079","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43079"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"},{"reference_url":"http://www.debian.org/security/2010/dsa-2119","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2119"},{"reference_url":"http://www.debian.org/security/2010/dsa-2135","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2135"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/04/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/04/6"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0749.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0749.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0750.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0750.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0751.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0751.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0752.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0752.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0753.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0753.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0754.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0754.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0755.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0755.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html"},{"reference_url":"http://www.securityfocus.com/bid/43845","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43845"},{"reference_url":"http://www.ubuntu.com/usn/USN-1005-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1005-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2897","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2897"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3097","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3097"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0230","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0230"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=595245","reference_id":"595245","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=595245"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165","reference_id":"599165","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3702","reference_id":"CVE-2010-3702","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3702"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://security.gentoo.org/glsa/201402-17","reference_id":"GLSA-201402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0749","reference_id":"RHSA-2010:0749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0750","reference_id":"RHSA-2010:0750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0751","reference_id":"RHSA-2010:0751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0752","reference_id":"RHSA-2010:0752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0753","reference_id":"RHSA-2010:0753","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0754","reference_id":"RHSA-2010:0754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0755","reference_id":"RHSA-2010:0755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0859","reference_id":"RHSA-2010:0859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1201","reference_id":"RHSA-2012:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1201"},{"reference_url":"https://usn.ubuntu.com/1005-1/","reference_id":"USN-1005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2010-3702"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-neqs-cg1p-7bb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31241?format=json","vulnerability_id":"VCID-ng15-dzek-kyda","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3607.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3607","reference_id":"","reference_type":"","scores":[{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91315","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.9133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91337","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.9139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.914","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91397","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91412","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91427","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526924","reference_id":"526924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526924"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-3607"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ng15-dzek-kyda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31250?format=json","vulnerability_id":"VCID-ngzc-42z2-8yae","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2142.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2142","reference_id":"","reference_type":"","scores":[{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60519","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60465","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60512","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79968","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79971","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79994","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.7993","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79959","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487773","reference_id":"487773","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487773"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=789936","reference_id":"789936","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=789936"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2012-2142"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngzc-42z2-8yae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31229?format=json","vulnerability_id":"VCID-rm6a-c4rf-f7hc","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0800","reference_id":"","reference_type":"","scores":[{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92605","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.9261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92628","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92633","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92645","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495887","reference_id":"495887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495887"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-0800"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31236?format=json","vulnerability_id":"VCID-uczb-yext-6yfq","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1188","reference_id":"","reference_type":"","scores":[{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95736","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95764","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95789","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.958","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95802","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495907","reference_id":"495907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495907"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779","reference_id":"575779","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1503","reference_id":"RHSA-2009:1503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1512","reference_id":"RHSA-2009:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1512"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-1188"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uczb-yext-6yfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31232?format=json","vulnerability_id":"VCID-uny2-k19n-1bb2","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1181","reference_id":"","reference_type":"","scores":[{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85086","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85119","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85157","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85207","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85221","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85247","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495894","reference_id":"495894","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495894"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-1181"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31234?format=json","vulnerability_id":"VCID-vudr-8rrg-hufx","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1183","reference_id":"","reference_type":"","scores":[{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82232","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82285","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82312","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82335","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82373","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82389","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82411","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495899","reference_id":"495899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495899"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-1183"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31242?format=json","vulnerability_id":"VCID-xddx-numk-a7bn","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3608","reference_id":"","reference_type":"","scores":[{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93944","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93973","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.9398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94001","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94003","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94002","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.9401","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94022","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526637","reference_id":"526637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526637"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1503","reference_id":"RHSA-2009:1503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1504","reference_id":"RHSA-2009:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1512","reference_id":"RHSA-2009:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1513","reference_id":"RHSA-2009:1513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-3608"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xddx-numk-a7bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31221?format=json","vulnerability_id":"VCID-ynvq-nzrq-9bca","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0146","reference_id":"","reference_type":"","scores":[{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82514","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82651","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612","reference_id":"490612","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-0146"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31243?format=json","vulnerability_id":"VCID-yu46-ypr2-dfce","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3609","reference_id":"","reference_type":"","scores":[{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.9065","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.9066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90669","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90685","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.9069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90709","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90704","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.9072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90721","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90732","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90751","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526893","reference_id":"526893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526893"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1500","reference_id":"RHSA-2009:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1503","reference_id":"RHSA-2009:1503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1504","reference_id":"RHSA-2009:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1512","reference_id":"RHSA-2009:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1513","reference_id":"RHSA-2009:1513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0401","reference_id":"RHSA-2010:0401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0755","reference_id":"RHSA-2010:0755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0755"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-3609"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31249?format=json","vulnerability_id":"VCID-zn54-s7jz-ruh8","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4654.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4654.json"},{"reference_url":"https://access.redhat.com/security/cve/cve-2010-4654","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/cve-2010-4654"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4654","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6457","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64524","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64396","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6445","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6448","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64504","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64519","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64517","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6455","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201310-03.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201310-03.xml"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2010-4654","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2010-4654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=672181","reference_id":"672181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=672181"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4654","reference_id":"CVE-2010-4654","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4654"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2010-4654"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zn54-s7jz-ruh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31240?format=json","vulnerability_id":"VCID-zr8n-mfu1-4yg4","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3606","reference_id":"","reference_type":"","scores":[{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.8942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89465","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89474","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.8949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89491","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89498","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89517","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526877","reference_id":"526877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526877"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1500","reference_id":"RHSA-2009:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71816?format=json","purl":"pkg:ebuild/app-text/poppler@0.22.2-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}],"aliases":["CVE-2009-3606"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zr8n-mfu1-4yg4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.22.2-r1"}