{"url":"http://public2.vulnerablecode.io/api/packages/83362?format=json","purl":"pkg:ebuild/app-text/poppler@0.24.5","type":"ebuild","namespace":"app-text","name":"poppler","version":"0.24.5","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.42.0","latest_non_vulnerable_version":"25.06.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57325?format=json","vulnerability_id":"VCID-21p7-89u3-bydd","summary":"Multiple vulnerabilities have been found in Poppler, allowing\n    remote attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4474.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4474.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4474","reference_id":"","reference_type":"","scores":[{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96189","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96206","published_at":"2026-04-09T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.9621","published_at":"2026-04-11T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96211","published_at":"2026-04-13T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.9622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96224","published_at":"2026-04-18T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96227","published_at":"2026-04-26T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96239","published_at":"2026-05-05T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96246","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024762","reference_id":"1024762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024762"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729064","reference_id":"729064","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729064"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/38817.txt","reference_id":"CVE-2013-4474;OSVDB-99066","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/38817.txt"},{"reference_url":"https://www.securityfocus.com/bid/63374/info","reference_id":"CVE-2013-4474;OSVDB-99066","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/63374/info"},{"reference_url":"https://security.gentoo.org/glsa/201401-21","reference_id":"GLSA-201401-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-21"},{"reference_url":"https://usn.ubuntu.com/2958-1/","reference_id":"USN-2958-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2958-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83362?format=json","purl":"pkg:ebuild/app-text/poppler@0.24.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.24.5"}],"aliases":["CVE-2013-4474"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-21p7-89u3-bydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57324?format=json","vulnerability_id":"VCID-cf6h-786m-rkds","summary":"Multiple vulnerabilities have been found in Poppler, allowing\n    remote attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4473","reference_id":"","reference_type":"","scores":[{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.8462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84641","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84661","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84677","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84678","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84679","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84706","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84731","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84757","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024753","reference_id":"1024753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024753"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729064","reference_id":"729064","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729064"},{"reference_url":"https://security.gentoo.org/glsa/201401-21","reference_id":"GLSA-201401-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-21"},{"reference_url":"https://usn.ubuntu.com/2958-1/","reference_id":"USN-2958-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2958-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83362?format=json","purl":"pkg:ebuild/app-text/poppler@0.24.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.24.5"}],"aliases":["CVE-2013-4473"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cf6h-786m-rkds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57326?format=json","vulnerability_id":"VCID-k44f-gsg9-eqce","summary":"Multiple vulnerabilities have been found in Poppler, allowing\n    remote attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7296.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7296","reference_id":"","reference_type":"","scores":[{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85224","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85257","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85301","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85317","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85314","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85336","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85358","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85385","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7296"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048199","reference_id":"1048199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048199"},{"reference_url":"https://security.gentoo.org/glsa/201401-21","reference_id":"GLSA-201401-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-21"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83362?format=json","purl":"pkg:ebuild/app-text/poppler@0.24.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.24.5"}],"aliases":["CVE-2013-7296"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k44f-gsg9-eqce"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@0.24.5"}