{"url":"http://public2.vulnerablecode.io/api/packages/85675?format=json","purl":"pkg:ebuild/app-text/xpdf@4.04","type":"ebuild","namespace":"app-text","name":"xpdf","version":"4.04","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.05","latest_non_vulnerable_version":"4.05","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61625?format=json","vulnerability_id":"VCID-8tce-4d32-wkgy","summary":"Multiple vulnerabilities have been discovered in Xpdf, the worst of which could possibly lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35376","reference_id":"","reference_type":"","scores":[{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63922","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6372","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63781","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63765","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63799","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63834","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6383","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63874","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35376"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202405-18","reference_id":"GLSA-202405-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85675?format=json","purl":"pkg:ebuild/app-text/xpdf@4.04","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/xpdf@4.04"}],"aliases":["CVE-2020-35376"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8tce-4d32-wkgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61626?format=json","vulnerability_id":"VCID-9rxm-r4mc-ckhe","summary":"Multiple vulnerabilities have been discovered in Xpdf, the worst of which could possibly lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27548","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48973","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48978","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48995","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49022","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4898","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48977","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48848","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48911","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48938","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27548"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011333","reference_id":"1011333","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011333"},{"reference_url":"https://security.gentoo.org/glsa/202405-18","reference_id":"GLSA-202405-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85675?format=json","purl":"pkg:ebuild/app-text/xpdf@4.04","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/xpdf@4.04"}],"aliases":["CVE-2021-27548"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9rxm-r4mc-ckhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61628?format=json","vulnerability_id":"VCID-mf6e-623v-r3cj","summary":"Multiple vulnerabilities have been discovered in Xpdf, the worst of which could possibly lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24107","reference_id":"","reference_type":"","scores":[{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31988","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32453","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32422","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32139","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32054","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31912","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31979","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24107"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202405-18","reference_id":"GLSA-202405-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-18"},{"reference_url":"https://usn.ubuntu.com/7985-1/","reference_id":"USN-7985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85675?format=json","purl":"pkg:ebuild/app-text/xpdf@4.04","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/xpdf@4.04"}],"aliases":["CVE-2022-24107"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mf6e-623v-r3cj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61627?format=json","vulnerability_id":"VCID-taxw-wn1q-23de","summary":"Multiple vulnerabilities have been discovered in Xpdf, the worst of which could possibly lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24106","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27194","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27357","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2728","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2711","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27173","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34665","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34623","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34725","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34752","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34701","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24106"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24106","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24106"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021669","reference_id":"1021669","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021669"},{"reference_url":"https://security.gentoo.org/glsa/202405-18","reference_id":"GLSA-202405-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-18"},{"reference_url":"https://usn.ubuntu.com/7985-1/","reference_id":"USN-7985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85675?format=json","purl":"pkg:ebuild/app-text/xpdf@4.04","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/xpdf@4.04"}],"aliases":["CVE-2022-24106"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-taxw-wn1q-23de"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61624?format=json","vulnerability_id":"VCID-ubtq-wukm-4fau","summary":"Multiple vulnerabilities have been discovered in Xpdf, the worst of which could possibly lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25725","reference_id":"","reference_type":"","scores":[{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39672","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.3982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39819","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39833","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.3979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.3984","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39549","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39538","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39328","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39394","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39409","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25725"},{"reference_url":"https://security.gentoo.org/glsa/202405-18","reference_id":"GLSA-202405-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85675?format=json","purl":"pkg:ebuild/app-text/xpdf@4.04","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/xpdf@4.04"}],"aliases":["CVE-2020-25725"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubtq-wukm-4fau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61630?format=json","vulnerability_id":"VCID-wnsz-6zd2-dqbx","summary":"Multiple vulnerabilities have been discovered in Xpdf, the worst of which could possibly lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38171","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28798","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28904","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28954","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28827","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28778","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30404","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30325","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30397","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30829","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3055","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30467","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38171"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-2813","reference_id":"AVG-2813","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2813"},{"reference_url":"https://security.gentoo.org/glsa/202405-18","reference_id":"GLSA-202405-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85675?format=json","purl":"pkg:ebuild/app-text/xpdf@4.04","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/xpdf@4.04"}],"aliases":["CVE-2022-38171"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wnsz-6zd2-dqbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61629?format=json","vulnerability_id":"VCID-ysst-cb32-t7dv","summary":"Multiple vulnerabilities have been discovered in Xpdf, the worst of which could possibly lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27135","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43051","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43245","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43248","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43297","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43232","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43088","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.42955","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43033","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27135"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202405-18","reference_id":"GLSA-202405-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85675?format=json","purl":"pkg:ebuild/app-text/xpdf@4.04","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/xpdf@4.04"}],"aliases":["CVE-2022-27135"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ysst-cb32-t7dv"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/xpdf@4.04"}