{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","type":"deb","namespace":"debian","name":"poppler","version":"25.03.0-5+deb13u2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"25.03.0-6","latest_non_vulnerable_version":"25.03.0-11.1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67392?format=json","vulnerability_id":"VCID-a8zz-dfdm-1uf7","summary":"poppler: Poppler stack overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43718.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43718","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00727","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00728","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0071","published_at":"2026-04-13T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00708","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00713","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00755","published_at":"2026-04-21T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00752","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00753","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00724","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00729","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00719","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00716","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00842","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43718"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117046","reference_id":"1117046","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400893","reference_id":"2400893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400893"},{"reference_url":"https://github.com/ShadowByte1/CVE-Reports/blob/main/CVE-2025-43718.md","reference_id":"CVE-2025-43718.md","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:15:35Z/"}],"url":"https://github.com/ShadowByte1/CVE-Reports/blob/main/CVE-2025-43718.md"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/f54b815672117c250420787c8c006de98e8c7408","reference_id":"f54b815672117c250420787c8c006de98e8c7408","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:15:35Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/f54b815672117c250420787c8c006de98e8c7408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7364","reference_id":"RHSA-2026:7364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7364"},{"reference_url":"https://usn.ubuntu.com/7803-1/","reference_id":"USN-7803-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7803-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935620?format=json","purl":"pkg:deb/debian/poppler@25.03.0-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2025-43718"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a8zz-dfdm-1uf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66912?format=json","vulnerability_id":"VCID-yy6j-1h5z-wbgp","summary":"poppler: Use-After-Free in StructTreeRoot class","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52885.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52885.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-52885","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06797","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06713","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06648","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06796","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06821","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06727","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-52885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52885"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117853","reference_id":"1117853","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117853"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884","reference_id":"1884","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T14:59:44Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884#note_3114334","reference_id":"1884#note_3114334","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T14:59:44Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884#note_3114334"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403224","reference_id":"2403224","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403224"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2025-042_poppler/","reference_id":"GHSL-2025-042_poppler","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T14:59:44Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2025-042_poppler/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7364","reference_id":"RHSA-2026:7364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7364"},{"reference_url":"https://usn.ubuntu.com/7858-1/","reference_id":"USN-7858-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7858-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2025-52885"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yy6j-1h5z-wbgp"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87797?format=json","vulnerability_id":"VCID-1j2u-8dqz-q3ad","summary":"xpdf: XRef table parsing infinite loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0207.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0207","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63391","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63258","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6331","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63362","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63397","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63361","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0207","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0207"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2010-0207","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2010-0207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=583738","reference_id":"583738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=583738"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.03-17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.03-17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.03-17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.04-13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.04-13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.04-13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.04-4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.04-4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.04-4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0207","reference_id":"CVE-2010-0207","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0207"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935594?format=json","purl":"pkg:deb/debian/poppler@0.16.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.16.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2010-0207"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1j2u-8dqz-q3ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49939?format=json","vulnerability_id":"VCID-1z9b-trb7-2ubp","summary":"KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n    making them vulnerable to the execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3626","reference_id":"","reference_type":"","scores":[{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92778","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92732","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92742","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92772","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09332","scoring_system":"epss","scoring_elements":"0.92783","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3626"},{"reference_url":"http://scary.beasts.org/security/CESA-2005-003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2005-003.txt"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626"},{"reference_url":"http://secunia.com/advisories/18147","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18147"},{"reference_url":"http://secunia.com/advisories/18303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18303"},{"reference_url":"http://secunia.com/advisories/18312","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18312"},{"reference_url":"http://secunia.com/advisories/18313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18313"},{"reference_url":"http://secunia.com/advisories/18329","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18329"},{"reference_url":"http://secunia.com/advisories/18332","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18332"},{"reference_url":"http://secunia.com/advisories/18334","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18334"},{"reference_url":"http://secunia.com/advisories/18335","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18335"},{"reference_url":"http://secunia.com/advisories/18338","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18338"},{"reference_url":"http://secunia.com/advisories/18349","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18349"},{"reference_url":"http://secunia.com/advisories/18373","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18373"},{"reference_url":"http://secunia.com/advisories/18375","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18375"},{"reference_url":"http://secunia.com/advisories/18380","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18380"},{"reference_url":"http://secunia.com/advisories/18385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18385"},{"reference_url":"http://secunia.com/advisories/18387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18387"},{"reference_url":"http://secunia.com/advisories/18389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18389"},{"reference_url":"http://secunia.com/advisories/18398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18398"},{"reference_url":"http://secunia.com/advisories/18407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18407"},{"reference_url":"http://secunia.com/advisories/18414","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18414"},{"reference_url":"http://secunia.com/advisories/18416","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18416"},{"reference_url":"http://secunia.com/advisories/18423","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18423"},{"reference_url":"http://secunia.com/advisories/18425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18425"},{"reference_url":"http://secunia.com/advisories/18428","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18428"},{"reference_url":"http://secunia.com/advisories/18436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18436"},{"reference_url":"http://secunia.com/advisories/18448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18448"},{"reference_url":"http://secunia.com/advisories/18463","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18463"},{"reference_url":"http://secunia.com/advisories/18517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18517"},{"reference_url":"http://secunia.com/advisories/18534","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18534"},{"reference_url":"http://secunia.com/advisories/18554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18554"},{"reference_url":"http://secunia.com/advisories/18582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18582"},{"reference_url":"http://secunia.com/advisories/18642","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18642"},{"reference_url":"http://secunia.com/advisories/18644","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18644"},{"reference_url":"http://secunia.com/advisories/18674","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18674"},{"reference_url":"http://secunia.com/advisories/18675","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18675"},{"reference_url":"http://secunia.com/advisories/18679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18679"},{"reference_url":"http://secunia.com/advisories/18908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18908"},{"reference_url":"http://secunia.com/advisories/18913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18913"},{"reference_url":"http://secunia.com/advisories/19230","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19230"},{"reference_url":"http://secunia.com/advisories/19377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19377"},{"reference_url":"http://secunia.com/advisories/25729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25729"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24026","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24026"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-931","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-931"},{"reference_url":"http://www.debian.org/security/2005/dsa-932","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-932"},{"reference_url":"http://www.debian.org/security/2005/dsa-937","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-937"},{"reference_url":"http://www.debian.org/security/2005/dsa-938","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-938"},{"reference_url":"http://www.debian.org/security/2005/dsa-940","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-940"},{"reference_url":"http://www.debian.org/security/2006/dsa-936","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-936"},{"reference_url":"http://www.debian.org/security/2006/dsa-950","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-950"},{"reference_url":"http://www.debian.org/security/2006/dsa-961","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-961"},{"reference_url":"http://www.debian.org/security/2006/dsa-962","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-962"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html"},{"reference_url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/16143","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/16143"},{"reference_url":"http://www.trustix.org/errata/2006/0002/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2006/0002/"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0047","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0047"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617828","reference_id":"1617828","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617828"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3626","reference_id":"CVE-2005-3626","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3626"},{"reference_url":"https://security.gentoo.org/glsa/200601-02","reference_id":"GLSA-200601-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200601-02"},{"reference_url":"https://security.gentoo.org/glsa/200601-17","reference_id":"GLSA-200601-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200601-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:840","reference_id":"RHSA-2005:840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:868","reference_id":"RHSA-2005:868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0160","reference_id":"RHSA-2006:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0163","reference_id":"RHSA-2006:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0177","reference_id":"RHSA-2006:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0177"},{"reference_url":"https://usn.ubuntu.com/236-1/","reference_id":"USN-236-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/236-1/"},{"reference_url":"https://usn.ubuntu.com/236-2/","reference_id":"USN-236-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/236-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935582?format=json","purl":"pkg:deb/debian/poppler@0.4.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2005-3626"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1z9b-trb7-2ubp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57325?format=json","vulnerability_id":"VCID-21p7-89u3-bydd","summary":"Multiple vulnerabilities have been found in Poppler, allowing\n    remote attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4474.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4474.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4474","reference_id":"","reference_type":"","scores":[{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96189","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96206","published_at":"2026-04-09T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.9621","published_at":"2026-04-11T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96211","published_at":"2026-04-13T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.9622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96224","published_at":"2026-04-18T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96227","published_at":"2026-04-26T12:55:00Z"},{"value":"0.25399","scoring_system":"epss","scoring_elements":"0.96228","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024762","reference_id":"1024762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024762"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729064","reference_id":"729064","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729064"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/38817.txt","reference_id":"CVE-2013-4474;OSVDB-99066","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/38817.txt"},{"reference_url":"https://www.securityfocus.com/bid/63374/info","reference_id":"CVE-2013-4474;OSVDB-99066","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/63374/info"},{"reference_url":"https://security.gentoo.org/glsa/201401-21","reference_id":"GLSA-201401-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-21"},{"reference_url":"https://usn.ubuntu.com/2958-1/","reference_id":"USN-2958-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2958-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935599?format=json","purl":"pkg:deb/debian/poppler@0.18.4-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.18.4-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2013-4474"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-21p7-89u3-bydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83248?format=json","vulnerability_id":"VCID-29b3-s5n9-5fd8","summary":"poppler: out of bounds read in pdfunite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13988.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13988.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-13988","reference_id":"","reference_type":"","scores":[{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70719","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.7471","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74685","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-13988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602838","reference_id":"1602838","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602838"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904922","reference_id":"904922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3757-1/","reference_id":"USN-3757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935602?format=json","purl":"pkg:deb/debian/poppler@0.69.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.69.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-13988"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29b3-s5n9-5fd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82697?format=json","vulnerability_id":"VCID-2ck3-hjtt-hbax","summary":"poppler: pdftohtml: access to uninitialized pointer could lead to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27778.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27778","reference_id":"","reference_type":"","scores":[{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51673","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51698","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51658","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51758","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.5176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51747","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51699","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51705","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51665","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27778"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900712","reference_id":"1900712","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1881","reference_id":"RHSA-2021:1881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1881"},{"reference_url":"https://usn.ubuntu.com/4646-1/","reference_id":"USN-4646-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4646-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2020-27778"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ck3-hjtt-hbax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31238?format=json","vulnerability_id":"VCID-35b2-jj1x-rkcf","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3604","reference_id":"","reference_type":"","scores":[{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.9176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91766","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91806","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07495","scoring_system":"epss","scoring_elements":"0.91808","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526911","reference_id":"526911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526911"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1500","reference_id":"RHSA-2009:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1503","reference_id":"RHSA-2009:1503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1512","reference_id":"RHSA-2009:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1512"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935591?format=json","purl":"pkg:deb/debian/poppler@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-3604"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-35b2-jj1x-rkcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31239?format=json","vulnerability_id":"VCID-3eaw-7xrw-tkft","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3605.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3605.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3605","reference_id":"","reference_type":"","scores":[{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.8895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89004","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.88998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89012","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.8901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89022","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.8903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04392","scoring_system":"epss","scoring_elements":"0.89033","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3605"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491840","reference_id":"491840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491840"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935591?format=json","purl":"pkg:deb/debian/poppler@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-3605"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3eaw-7xrw-tkft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83989?format=json","vulnerability_id":"VCID-3kw1-pxdk-27h4","summary":"poppler: NULL pointer dereference in the SplashOutputDev::type3D0() function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14927.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14927.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14927","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36224","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36209","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35926","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49424","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4942","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49389","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4937","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14927"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102604","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14927"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500324","reference_id":"1500324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500324"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877237","reference_id":"877237","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877237"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14927","reference_id":"CVE-2017-14927","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14927"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14927"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3kw1-pxdk-27h4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69077?format=json","vulnerability_id":"VCID-3u3m-ru9u-buem","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9775.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9775","reference_id":"","reference_type":"","scores":[{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73062","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73065","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73589","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.7363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73643","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.7364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73693","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466442","reference_id":"1466442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466442"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865680","reference_id":"865680","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865680"},{"reference_url":"https://security.archlinux.org/ASA-201706-33","reference_id":"ASA-201706-33","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-33"},{"reference_url":"https://security.archlinux.org/AVG-326","reference_id":"AVG-326","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2551","reference_id":"RHSA-2017:2551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2551"},{"reference_url":"https://usn.ubuntu.com/3350-1/","reference_id":"USN-3350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3350-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935603?format=json","purl":"pkg:deb/debian/poppler@0.57.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.57.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-9775"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3u3m-ru9u-buem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31247?format=json","vulnerability_id":"VCID-4128-ep6n-hufz","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3704.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3704","reference_id":"","reference_type":"","scores":[{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80473","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80338","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80365","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80354","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80382","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80392","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80389","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80418","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.8042","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80423","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01395","scoring_system":"epss","scoring_elements":"0.80455","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704"},{"reference_url":"http://secunia.com/advisories/42141","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42141"},{"reference_url":"http://secunia.com/advisories/42357","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42357"},{"reference_url":"http://secunia.com/advisories/42397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42397"},{"reference_url":"http://secunia.com/advisories/42691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42691"},{"reference_url":"http://secunia.com/advisories/43079","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43079"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"},{"reference_url":"http://www.debian.org/security/2010/dsa-2119","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2119"},{"reference_url":"http://www.debian.org/security/2010/dsa-2135","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2135"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/04/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/04/6"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0749.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0749.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0751.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0751.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0752.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0752.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0753.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0753.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html"},{"reference_url":"http://www.securityfocus.com/bid/43841","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43841"},{"reference_url":"http://www.ubuntu.com/usn/USN-1005-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1005-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2897","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2897"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3097","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3097"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0230","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0230"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165","reference_id":"599165","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=638960","reference_id":"638960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=638960"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3704","reference_id":"CVE-2010-3704","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3704"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://security.gentoo.org/glsa/201402-17","reference_id":"GLSA-201402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0749","reference_id":"RHSA-2010:0749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0751","reference_id":"RHSA-2010:0751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0752","reference_id":"RHSA-2010:0752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0753","reference_id":"RHSA-2010:0753","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0859","reference_id":"RHSA-2010:0859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1201","reference_id":"RHSA-2012:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1201"},{"reference_url":"https://usn.ubuntu.com/1005-1/","reference_id":"USN-1005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935595?format=json","purl":"pkg:deb/debian/poppler@0.12.4-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.4-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2010-3704"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4128-ep6n-hufz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69084?format=json","vulnerability_id":"VCID-44yv-r4hg-17db","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14520.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14520","reference_id":"","reference_type":"","scores":[{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44856","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45051","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45044","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44904","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44913","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44956","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45009","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51975","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51927","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14520"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102719","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2018/dsa-4079","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1494582","reference_id":"1494582","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1494582"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876081","reference_id":"876081","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876081"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14520","reference_id":"CVE-2017-14520","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14520"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14520"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-44yv-r4hg-17db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96739?format=json","vulnerability_id":"VCID-48d5-zxmm-r3g4","summary":"An issue in the pdfseparate utility of freedesktop poppler v25.04.0 allows attackers to cause an infinite recursion via supplying a crafted PDF file. This can lead to a Denial of Service (DoS).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50420","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16103","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16224","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16163","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17679","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17628","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18505","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18676","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18546","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50420"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110463","reference_id":"1110463","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110463"},{"reference_url":"https://github.com/Landw-hub/CVE-2025-50420","reference_id":"CVE-2025-50420","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-04T19:38:23Z/"}],"url":"https://github.com/Landw-hub/CVE-2025-50420"},{"reference_url":"http://freedesktop.com","reference_id":"freedesktop.com","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-04T19:38:23Z/"}],"url":"http://freedesktop.com"},{"reference_url":"http://poppler.com","reference_id":"poppler.com","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-04T19:38:23Z/"}],"url":"http://poppler.com"},{"reference_url":"https://usn.ubuntu.com/7708-1/","reference_id":"USN-7708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7708-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935622?format=json","purl":"pkg:deb/debian/poppler@25.03.0-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2025-50420"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48d5-zxmm-r3g4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78166?format=json","vulnerability_id":"VCID-48ua-ch85-w3cg","summary":"poppler: Reachable assertion in Object.h","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38349.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38349.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38349","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05443","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05815","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05785","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05743","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05714","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38349"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38349","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38349"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282","reference_id":"1282","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:39:03Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2251630","reference_id":"2251630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2251630"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/4564a002bcb6094cc460bc0d5ddff9423fe6dd28","reference_id":"4564a002bcb6094cc460bc0d5ddff9423fe6dd28","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:39:03Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/4564a002bcb6094cc460bc0d5ddff9423fe6dd28"},{"reference_url":"https://usn.ubuntu.com/6508-1/","reference_id":"USN-6508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6508-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935614?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2022-38349"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48ua-ch85-w3cg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31235?format=json","vulnerability_id":"VCID-4jfu-4w71-g7bt","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1187","reference_id":"","reference_type":"","scores":[{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-04-01T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97315","published_at":"2026-04-07T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97324","published_at":"2026-04-11T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97339","published_at":"2026-04-26T12:55:00Z"},{"value":"0.39915","scoring_system":"epss","scoring_elements":"0.97342","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495906","reference_id":"495906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-1187"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4jfu-4w71-g7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87796?format=json","vulnerability_id":"VCID-4rx1-68jr-myac","summary":"xpdf: Invalid pointer dereference by processing JBIG2 PDF stream objects","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0206.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0206","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63391","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63258","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6331","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63362","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63397","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63361","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0206","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0206"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2010-0206","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2010-0206"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=580105","reference_id":"580105","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=580105"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.03-17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.03-17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.03-17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.04-13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.04-13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.04-13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.04-4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.04-4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.04-4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0206","reference_id":"CVE-2010-0206","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0206"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935594?format=json","purl":"pkg:deb/debian/poppler@0.16.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.16.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2010-0206"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4rx1-68jr-myac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70459?format=json","vulnerability_id":"VCID-4ucr-xaac-7uc7","summary":"poppler: Floating-Point Exception in Poppler","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32364.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32364.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32364","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26478","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26333","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26281","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26256","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29755","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32364"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102190","reference_id":"1102190","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102190"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1574","reference_id":"1574","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T16:06:56Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1574"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357657","reference_id":"2357657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357657"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/d87bc726c7cc98f8c26b60ece5f20236e9de1bc3","reference_id":"d87bc726c7cc98f8c26b60ece5f20236e9de1bc3","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T16:06:56Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/d87bc726c7cc98f8c26b60ece5f20236e9de1bc3"},{"reference_url":"https://usn.ubuntu.com/7426-1/","reference_id":"USN-7426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7426-1/"},{"reference_url":"https://usn.ubuntu.com/7426-2/","reference_id":"USN-7426-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7426-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935619?format=json","purl":"pkg:deb/debian/poppler@25.03.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2025-32364"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ucr-xaac-7uc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31246?format=json","vulnerability_id":"VCID-4yej-ag45-uuga","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=bf2055088a3a2d3bb3d3c37d464954ec1a25771f"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3703","reference_id":"","reference_type":"","scores":[{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78249","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78286","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703"},{"reference_url":"http://secunia.com/advisories/42357","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42357"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/04/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/04/6"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1005-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1005-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165","reference_id":"599165","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=639356","reference_id":"639356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=639356"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3703","reference_id":"CVE-2010-3703","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3703"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0859","reference_id":"RHSA-2010:0859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0859"},{"reference_url":"https://usn.ubuntu.com/1005-1/","reference_id":"USN-1005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935595?format=json","purl":"pkg:deb/debian/poppler@0.12.4-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.4-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2010-3703"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4yej-ag45-uuga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82120?format=json","vulnerability_id":"VCID-5jej-esjt-uqak","summary":"poppler: integer overflow in Parser::makeStream in Parser.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21009.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-21009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-21009","reference_id":"","reference_type":"","scores":[{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65047","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65188","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65161","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.6519","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65097","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65088","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.6515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65167","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65177","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-21009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21009"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/commit/0868c499a9f5f37f8df5c9fef03c37496b40fc8a","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/commit/0868c499a9f5f37f8df5c9fef03c37496b40fc8a"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1753850","reference_id":"1753850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1753850"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-21009","reference_id":"CVE-2018-21009","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-21009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1074","reference_id":"RHSA-2020:1074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1074"},{"reference_url":"https://usn.ubuntu.com/4646-1/","reference_id":"USN-4646-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4646-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935602?format=json","purl":"pkg:deb/debian/poppler@0.69.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.69.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-21009"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5jej-esjt-uqak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82426?format=json","vulnerability_id":"VCID-5py7-z1gg-9fet","summary":"poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14494.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14494","reference_id":"","reference_type":"","scores":[{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83467","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.8348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83493","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83518","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83566","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83567","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.836","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01969","scoring_system":"epss","scoring_elements":"0.83605","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1797453","reference_id":"1797453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1797453"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=933812","reference_id":"933812","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=933812"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3977","reference_id":"RHSA-2020:3977","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4643","reference_id":"RHSA-2020:4643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4643"},{"reference_url":"https://usn.ubuntu.com/4091-1/","reference_id":"USN-4091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4091-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-14494"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5py7-z1gg-9fet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34312?format=json","vulnerability_id":"VCID-5q1h-7uk2-nkhx","summary":"Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n    Poppler potentially resulting in the execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"},{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2005-868.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2005-868.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3193","reference_id":"","reference_type":"","scores":[{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86694","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86592","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86641","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86651","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86664","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86662","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86675","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86686","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193"},{"reference_url":"http://secunia.com/advisories/17897","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17897"},{"reference_url":"http://secunia.com/advisories/17912","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17912"},{"reference_url":"http://secunia.com/advisories/17916","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17916"},{"reference_url":"http://secunia.com/advisories/17920","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17920"},{"reference_url":"http://secunia.com/advisories/17926","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17926"},{"reference_url":"http://secunia.com/advisories/17929","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17929"},{"reference_url":"http://secunia.com/advisories/17940","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17940"},{"reference_url":"http://secunia.com/advisories/17955","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17955"},{"reference_url":"http://secunia.com/advisories/17956","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17956"},{"reference_url":"http://secunia.com/advisories/17959","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17959"},{"reference_url":"http://secunia.com/advisories/17976","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17976"},{"reference_url":"http://secunia.com/advisories/18009","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18009"},{"reference_url":"http://secunia.com/advisories/18055","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18055"},{"reference_url":"http://secunia.com/advisories/18061","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18061"},{"reference_url":"http://secunia.com/advisories/18147","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18147"},{"reference_url":"http://secunia.com/advisories/18189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18189"},{"reference_url":"http://secunia.com/advisories/18191","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18191"},{"reference_url":"http://secunia.com/advisories/18192","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18192"},{"reference_url":"http://secunia.com/advisories/18303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18303"},{"reference_url":"http://secunia.com/advisories/18313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18313"},{"reference_url":"http://secunia.com/advisories/18336","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18336"},{"reference_url":"http://secunia.com/advisories/18349","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18349"},{"reference_url":"http://secunia.com/advisories/18380","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18380"},{"reference_url":"http://secunia.com/advisories/18385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18385"},{"reference_url":"http://secunia.com/advisories/18387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18387"},{"reference_url":"http://secunia.com/advisories/18389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18389"},{"reference_url":"http://secunia.com/advisories/18398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18398"},{"reference_url":"http://secunia.com/advisories/18407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18407"},{"reference_url":"http://secunia.com/advisories/18416","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18416"},{"reference_url":"http://secunia.com/advisories/18448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18448"},{"reference_url":"http://secunia.com/advisories/18517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18517"},{"reference_url":"http://secunia.com/advisories/18520","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18520"},{"reference_url":"http://secunia.com/advisories/18534","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18534"},{"reference_url":"http://secunia.com/advisories/18554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18554"},{"reference_url":"http://secunia.com/advisories/18582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18582"},{"reference_url":"http://secunia.com/advisories/18674","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18674"},{"reference_url":"http://secunia.com/advisories/18675","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18675"},{"reference_url":"http://secunia.com/advisories/18679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18679"},{"reference_url":"http://secunia.com/advisories/18908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18908"},{"reference_url":"http://secunia.com/advisories/18913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18913"},{"reference_url":"http://secunia.com/advisories/19125","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19125"},{"reference_url":"http://secunia.com/advisories/19230","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19230"},{"reference_url":"http://secunia.com/advisories/19377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19377"},{"reference_url":"http://secunia.com/advisories/19797","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19797"},{"reference_url":"http://secunia.com/advisories/19798","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19798"},{"reference_url":"http://secunia.com/advisories/25729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25729"},{"reference_url":"http://secunia.com/advisories/26413","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26413"},{"reference_url":"http://securityreason.com/securityalert/236","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/236"},{"reference_url":"http://securitytracker.com/id?1015309","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015309"},{"reference_url":"http://securitytracker.com/id?1015324","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015324"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23441","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23441"},{"reference_url":"https://issues.rpath.com/browse/RPL-1609","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1609"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-931","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-931"},{"reference_url":"http://www.debian.org/security/2005/dsa-932","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-932"},{"reference_url":"http://www.debian.org/security/2005/dsa-937","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-937"},{"reference_url":"http://www.debian.org/security/2005/dsa-938","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-938"},{"reference_url":"http://www.debian.org/security/2005/dsa-940","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-940"},{"reference_url":"http://www.debian.org/security/2006/dsa-936","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-936"},{"reference_url":"http://www.debian.org/security/2006/dsa-950","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-950"},{"reference_url":"http://www.debian.org/security/2006/dsa-961","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-961"},{"reference_url":"http://www.debian.org/security/2006/dsa-962","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-962"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-1.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-1.txt"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-840.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-840.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-867.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-867.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-878.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-878.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"reference_url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15721","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15721"},{"reference_url":"http://www.trustix.org/errata/2005/0072/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0072/"},{"reference_url":"http://www.ubuntulinux.org/usn/usn-227-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntulinux.org/usn/usn-227-1"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2787","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2787"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2789","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2789"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2790","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2790"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2856","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2856"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617798","reference_id":"1617798","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617798"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281","reference_id":"342281","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288","reference_id":"342288","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3193","reference_id":"CVE-2005-3193","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3193"},{"reference_url":"https://security.gentoo.org/glsa/200512-08","reference_id":"GLSA-200512-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200512-08"},{"reference_url":"https://security.gentoo.org/glsa/200603-02","reference_id":"GLSA-200603-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200603-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:840","reference_id":"RHSA-2005:840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:867","reference_id":"RHSA-2005:867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:868","reference_id":"RHSA-2005:868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:878","reference_id":"RHSA-2005:878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0160","reference_id":"RHSA-2006:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0160"},{"reference_url":"https://usn.ubuntu.com/227-1/","reference_id":"USN-227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935581?format=json","purl":"pkg:deb/debian/poppler@0.4.2-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.2-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2005-3193"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5q1h-7uk2-nkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31227?format=json","vulnerability_id":"VCID-65sa-tagy-3ybs","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0799","reference_id":"","reference_type":"","scores":[{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76577","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76669","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76682","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495886","reference_id":"495886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495886"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-0799"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31233?format=json","vulnerability_id":"VCID-68rw-a4ah-5khm","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1182","reference_id":"","reference_type":"","scores":[{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91487","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91521","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07101","scoring_system":"epss","scoring_elements":"0.91555","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495896","reference_id":"495896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495896"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-1182"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31254?format=json","vulnerability_id":"VCID-6b75-d741-vufk","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91"},{"reference_url":"http://j00ru.vexillium.org/?p=1507","reference_id":"","reference_type":"","scores":[],"url":"http://j00ru.vexillium.org/?p=1507"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1790.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1790.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1790","reference_id":"","reference_type":"","scores":[{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86121","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86012","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86039","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86059","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.8608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86098","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02786","scoring_system":"epss","scoring_elements":"0.86111","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790"},{"reference_url":"http://secunia.com/advisories/52846","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52846"},{"reference_url":"http://ubuntu.com/usn/usn-1785-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1785-1"},{"reference_url":"http://www.debian.org/security/2013/dsa-2719","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2719"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:143","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:143"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/8"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071","reference_id":"702071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=917111","reference_id":"917111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=917111"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1790","reference_id":"CVE-2013-1790","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1790"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/1785-1/","reference_id":"USN-1785-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1785-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935598?format=json","purl":"pkg:deb/debian/poppler@0.18.4-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.18.4-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2013-1790"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6b75-d741-vufk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31237?format=json","vulnerability_id":"VCID-6dwz-8kx9-rugr","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3603","reference_id":"","reference_type":"","scores":[{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90892","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.9092","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90928","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90952","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.9095","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90962","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06276","scoring_system":"epss","scoring_elements":"0.90959","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526915","reference_id":"526915","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526915"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1504","reference_id":"RHSA-2009:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1504"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935591?format=json","purl":"pkg:deb/debian/poppler@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-3603"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwz-8kx9-rugr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56452?format=json","vulnerability_id":"VCID-6wa8-zfbz-hqcg","summary":"Multiple vulnerabilities in Xpdf could result in execution of\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4035.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4035.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4035","reference_id":"","reference_type":"","scores":[{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.8513","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85159","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85161","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85183","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85221","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85244","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85253","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0245","scoring_system":"epss","scoring_elements":"0.85251","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=541614","reference_id":"541614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=541614"},{"reference_url":"https://security.gentoo.org/glsa/201402-17","reference_id":"GLSA-201402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1680","reference_id":"RHSA-2009:1680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1681","reference_id":"RHSA-2009:1681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1682","reference_id":"RHSA-2009:1682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1682"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935593?format=json","purl":"pkg:deb/debian/poppler@0.5.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.5.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-4035"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6wa8-zfbz-hqcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79174?format=json","vulnerability_id":"VCID-72nw-9jgd-4kdw","summary":"poppler: abort in main() in pdfunite.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37051.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37051","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1369","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13508","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1342","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13489","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13496","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13468","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13361","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37051"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234528","reference_id":"2234528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234528"},{"reference_url":"https://usn.ubuntu.com/6508-1/","reference_id":"USN-6508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6508-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935612?format=json","purl":"pkg:deb/debian/poppler@22.08.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.08.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2022-37051"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-72nw-9jgd-4kdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82919?format=json","vulnerability_id":"VCID-74sz-r8kq-qkd5","summary":"poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20551.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20551","reference_id":"","reference_type":"","scores":[{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54012","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54067","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54133","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54137","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54117","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5403","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54056","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54085","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54111","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54094","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/703","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/703"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/merge_requests/146","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/merge_requests/146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665259","reference_id":"1665259","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665259"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917525","reference_id":"917525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917525"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20551","reference_id":"CVE-2018-20551","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/3886-1/","reference_id":"USN-3886-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3886-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935605?format=json","purl":"pkg:deb/debian/poppler@0.71.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-20551"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-74sz-r8kq-qkd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83988?format=json","vulnerability_id":"VCID-7n47-6efe-eybd","summary":"poppler: NULL pointer dereference in the AnnotRichMedia::Content::Content","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14926.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14926.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14926","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38322","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38691","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52486","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52531","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52395","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52433","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14926"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102601","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14926"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500323","reference_id":"1500323","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500323"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877239","reference_id":"877239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877239"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14926","reference_id":"CVE-2017-14926","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14926"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14926"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7n47-6efe-eybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82739?format=json","vulnerability_id":"VCID-7p5r-eqxs-tugv","summary":"poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9631.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9631","reference_id":"","reference_type":"","scores":[{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84271","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84405","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84364","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.8439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.844","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84284","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84303","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84326","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84331","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84349","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84338","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.8436","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02178","scoring_system":"epss","scoring_elements":"0.84361","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9631"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/736","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/736"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00011.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWP5XSUG6GNRI75NYKF53KIB2CZY6QQ6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWP5XSUG6GNRI75NYKF53KIB2CZY6QQ6/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1686802","reference_id":"1686802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1686802"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926673","reference_id":"926673","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926673"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9631","reference_id":"CVE-2019-9631","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9631"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935605?format=json","purl":"pkg:deb/debian/poppler@0.71.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-9631"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7p5r-eqxs-tugv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31244?format=json","vulnerability_id":"VCID-8nj9-hqay-dfdj","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3938.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3938.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3938","reference_id":"","reference_type":"","scores":[{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87454","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87464","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87478","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.8748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87517","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87546","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87545","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680","reference_id":"534680","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534680"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=537471","reference_id":"537471","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=537471"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935592?format=json","purl":"pkg:deb/debian/poppler@0.12.2-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.2-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-3938"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8nj9-hqay-dfdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82724?format=json","vulnerability_id":"VCID-8t2a-b56v-tqcs","summary":"poppler: stack consumption in function Dict::find() in Dict.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9903.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9903.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9903","reference_id":"","reference_type":"","scores":[{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72751","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72801","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72679","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72657","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72733","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72716","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00732","scoring_system":"epss","scoring_elements":"0.72759","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9903"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/741","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/741"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/"},{"reference_url":"https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/","reference_id":"","reference_type":"","scores":[],"url":"https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/"},{"reference_url":"http://www.securityfocus.com/bid/107560","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107560"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1691724","reference_id":"1691724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1691724"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925264","reference_id":"925264","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925264"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9903","reference_id":"CVE-2019-9903","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-9903"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8t2a-b56v-tqcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34308?format=json","vulnerability_id":"VCID-8uds-zs9k-47en","summary":"Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n    Poppler potentially resulting in the execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"},{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2005-868.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2005-868.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3191.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3191","reference_id":"","reference_type":"","scores":[{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86694","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86592","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86641","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86651","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86664","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86662","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86675","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03031","scoring_system":"epss","scoring_elements":"0.86686","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191"},{"reference_url":"http://secunia.com/advisories/17897","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17897"},{"reference_url":"http://secunia.com/advisories/17908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17908"},{"reference_url":"http://secunia.com/advisories/17912","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17912"},{"reference_url":"http://secunia.com/advisories/17916","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17916"},{"reference_url":"http://secunia.com/advisories/17920","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17920"},{"reference_url":"http://secunia.com/advisories/17921","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17921"},{"reference_url":"http://secunia.com/advisories/17926","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17926"},{"reference_url":"http://secunia.com/advisories/17929","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17929"},{"reference_url":"http://secunia.com/advisories/17940","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17940"},{"reference_url":"http://secunia.com/advisories/17955","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17955"},{"reference_url":"http://secunia.com/advisories/17976","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17976"},{"reference_url":"http://secunia.com/advisories/18009","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18009"},{"reference_url":"http://secunia.com/advisories/18055","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18055"},{"reference_url":"http://secunia.com/advisories/18061","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18061"},{"reference_url":"http://secunia.com/advisories/18147","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18147"},{"reference_url":"http://secunia.com/advisories/18189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18189"},{"reference_url":"http://secunia.com/advisories/18191","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18191"},{"reference_url":"http://secunia.com/advisories/18192","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18192"},{"reference_url":"http://secunia.com/advisories/18303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18303"},{"reference_url":"http://secunia.com/advisories/18313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18313"},{"reference_url":"http://secunia.com/advisories/18336","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18336"},{"reference_url":"http://secunia.com/advisories/18349","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18349"},{"reference_url":"http://secunia.com/advisories/18380","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18380"},{"reference_url":"http://secunia.com/advisories/18385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18385"},{"reference_url":"http://secunia.com/advisories/18387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18387"},{"reference_url":"http://secunia.com/advisories/18389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18389"},{"reference_url":"http://secunia.com/advisories/18398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18398"},{"reference_url":"http://secunia.com/advisories/18407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18407"},{"reference_url":"http://secunia.com/advisories/18416","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18416"},{"reference_url":"http://secunia.com/advisories/18428","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18428"},{"reference_url":"http://secunia.com/advisories/18436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18436"},{"reference_url":"http://secunia.com/advisories/18448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18448"},{"reference_url":"http://secunia.com/advisories/18503","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18503"},{"reference_url":"http://secunia.com/advisories/18517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18517"},{"reference_url":"http://secunia.com/advisories/18534","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18534"},{"reference_url":"http://secunia.com/advisories/18549","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18549"},{"reference_url":"http://secunia.com/advisories/18554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18554"},{"reference_url":"http://secunia.com/advisories/18582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18582"},{"reference_url":"http://secunia.com/advisories/18674","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18674"},{"reference_url":"http://secunia.com/advisories/18675","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18675"},{"reference_url":"http://secunia.com/advisories/18679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18679"},{"reference_url":"http://secunia.com/advisories/18908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18908"},{"reference_url":"http://secunia.com/advisories/18913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18913"},{"reference_url":"http://secunia.com/advisories/19230","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19230"},{"reference_url":"http://secunia.com/advisories/19377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19377"},{"reference_url":"http://secunia.com/advisories/19797","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19797"},{"reference_url":"http://secunia.com/advisories/19798","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19798"},{"reference_url":"http://secunia.com/advisories/25729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25729"},{"reference_url":"http://secunia.com/advisories/26413","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26413"},{"reference_url":"http://securityreason.com/securityalert/233","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/233"},{"reference_url":"http://securityreason.com/securityalert/234","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/234"},{"reference_url":"http://securitytracker.com/id?1015309","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015309"},{"reference_url":"http://securitytracker.com/id?1015324","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015324"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23443","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23443"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23444","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23444"},{"reference_url":"https://issues.rpath.com/browse/RPL-1609","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1609"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-931","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-931"},{"reference_url":"http://www.debian.org/security/2005/dsa-932","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-932"},{"reference_url":"http://www.debian.org/security/2005/dsa-937","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-937"},{"reference_url":"http://www.debian.org/security/2005/dsa-938","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-938"},{"reference_url":"http://www.debian.org/security/2005/dsa-940","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-940"},{"reference_url":"http://www.debian.org/security/2006/dsa-936","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-936"},{"reference_url":"http://www.debian.org/security/2006/dsa-950","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-950"},{"reference_url":"http://www.debian.org/security/2006/dsa-961","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-961"},{"reference_url":"http://www.debian.org/security/2006/dsa-962","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-962"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities"},{"reference_url":"http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-1.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-1.txt"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2006_02_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2006_02_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-840.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-840.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-867.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-867.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-878.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-878.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"reference_url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15726","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15726"},{"reference_url":"http://www.securityfocus.com/bid/15727","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15727"},{"reference_url":"http://www.trustix.org/errata/2005/0072/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0072/"},{"reference_url":"http://www.ubuntulinux.org/usn/usn-227-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntulinux.org/usn/usn-227-1"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2786","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2786"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2787","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2787"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2788","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2788"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2789","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2789"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2790","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2790"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2856","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2856"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617796","reference_id":"1617796","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617796"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281","reference_id":"342281","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288","reference_id":"342288","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3191","reference_id":"CVE-2005-3191","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3191"},{"reference_url":"https://security.gentoo.org/glsa/200512-08","reference_id":"GLSA-200512-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200512-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:840","reference_id":"RHSA-2005:840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:867","reference_id":"RHSA-2005:867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:868","reference_id":"RHSA-2005:868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:878","reference_id":"RHSA-2005:878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0160","reference_id":"RHSA-2006:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0160"},{"reference_url":"https://usn.ubuntu.com/227-1/","reference_id":"USN-227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935581?format=json","purl":"pkg:deb/debian/poppler@0.4.2-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.2-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2005-3191"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8uds-zs9k-47en"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82664?format=json","vulnerability_id":"VCID-96jm-1vhy-eyfd","summary":"poppler: infinite recursion in function FontInfoScanner::scanFonts in FontInfo.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11026.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11026.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11026","reference_id":"","reference_type":"","scores":[{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66593","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.6658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66631","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11026"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/752","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/752"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5JWQE2WP4W4F2FEYPYJQBPQIOG75MVH/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5JWQE2WP4W4F2FEYPYJQBPQIOG75MVH/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/"},{"reference_url":"https://research.loginsoft.com/bugs/1508/","reference_id":"","reference_type":"","scores":[],"url":"https://research.loginsoft.com/bugs/1508/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1699862","reference_id":"1699862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1699862"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926721","reference_id":"926721","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926721"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.75.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.75.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.75.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11026","reference_id":"CVE-2019-11026","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11026"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-11026"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-96jm-1vhy-eyfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93950?format=json","vulnerability_id":"VCID-9hnb-h64u-zkev","summary":"In Xpdf 4.01.01, a buffer over-read could be triggered in FoFiType1C::convertToType1 in fofi/FoFiType1C.cc when the index number is larger than the charset array bounds. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12957","reference_id":"","reference_type":"","scores":[{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52424","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52452","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52463","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5249","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52914","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52862","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12957"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12957","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12957"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935610?format=json","purl":"pkg:deb/debian/poppler@0.22.5-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.22.5-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-12957"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9hnb-h64u-zkev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/257814?format=json","vulnerability_id":"VCID-9kq5-863e-3fgq","summary":"xpdfreader 4.03 is vulnerable to Buffer Overflow.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-40226","reference_id":"","reference_type":"","scores":[{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67062","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67025","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67031","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67033","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67049","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-40226"},{"reference_url":"https://forum.xpdfreader.com/viewtopic.php?f=3&t=42185","reference_id":"viewtopic.php?f=3&t=42185","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T17:56:37Z/"}],"url":"https://forum.xpdfreader.com/viewtopic.php?f=3&t=42185"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2021-40226"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9kq5-863e-3fgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31251?format=json","vulnerability_id":"VCID-9yxn-jhqm-hbhv","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=0388837f01bc467045164f9ddaff787000a8caaa"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=bbc2d8918fe234b7ef2c480eb148943922cc0959"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=e14b6e9c13d35c9bd1e0c50906ace8e707816888"},{"reference_url":"http://j00ru.vexillium.org/?p=1507","reference_id":"","reference_type":"","scores":[],"url":"http://j00ru.vexillium.org/?p=1507"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1788.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1788","reference_id":"","reference_type":"","scores":[{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88688","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88614","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.8863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.8865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.8866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88673","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.8867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04145","scoring_system":"epss","scoring_elements":"0.88689","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788"},{"reference_url":"http://secunia.com/advisories/52846","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52846"},{"reference_url":"http://ubuntu.com/usn/usn-1785-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1785-1"},{"reference_url":"http://www.debian.org/security/2013/dsa-2719","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2719"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:143","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:143"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/8"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071","reference_id":"702071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=917108","reference_id":"917108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=917108"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1788","reference_id":"CVE-2013-1788","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1788"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/1785-1/","reference_id":"USN-1785-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1785-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935598?format=json","purl":"pkg:deb/debian/poppler@0.18.4-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.18.4-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2013-1788"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yxn-jhqm-hbhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70210?format=json","vulnerability_id":"VCID-anb3-1s96-wbaq","summary":"poppler: SignatureValue not checked within SignerInfo","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43903.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43903.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43903","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13033","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12901","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12924","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12889","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13085","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12963","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12974","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12797","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.128","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43903"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103545","reference_id":"1103545","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103545"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2361067","reference_id":"2361067","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2361067"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/f1b9c830f145a0042e853d6462b2f9ca4016c669","reference_id":"f1b9c830f145a0042e853d6462b2f9ca4016c669","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:50:50Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/f1b9c830f145a0042e853d6462b2f9ca4016c669"},{"reference_url":"https://usn.ubuntu.com/7471-1/","reference_id":"USN-7471-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7471-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935621?format=json","purl":"pkg:deb/debian/poppler@25.03.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2025-43903"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-anb3-1s96-wbaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78187?format=json","vulnerability_id":"VCID-bc96-6vy6-ryfz","summary":"poppler: Stack-Overflow in `FoFiType1C::cvtGlyph`","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36023.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36023.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-36023","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20984","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20804","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.208","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21064","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20956","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20955","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-36023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36023","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36023"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1013","reference_id":"1013","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T17:59:31Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1013"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231510","reference_id":"2231510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231510"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T17:59:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00017.html"},{"reference_url":"https://usn.ubuntu.com/6299-1/","reference_id":"USN-6299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6299-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935612?format=json","purl":"pkg:deb/debian/poppler@22.08.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.08.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2020-36023"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bc96-6vy6-ryfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49940?format=json","vulnerability_id":"VCID-bkr4-sab1-5ka2","summary":"KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n    making them vulnerable to the execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3627","reference_id":"","reference_type":"","scores":[{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88949","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88863","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88887","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88888","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88906","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88912","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88931","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88929","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88925","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.88942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04327","scoring_system":"epss","scoring_elements":"0.8895","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3627"},{"reference_url":"http://scary.beasts.org/security/CESA-2005-003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2005-003.txt"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627"},{"reference_url":"http://secunia.com/advisories/18147","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18147"},{"reference_url":"http://secunia.com/advisories/18303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18303"},{"reference_url":"http://secunia.com/advisories/18312","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18312"},{"reference_url":"http://secunia.com/advisories/18313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18313"},{"reference_url":"http://secunia.com/advisories/18329","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18329"},{"reference_url":"http://secunia.com/advisories/18332","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18332"},{"reference_url":"http://secunia.com/advisories/18334","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18334"},{"reference_url":"http://secunia.com/advisories/18335","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18335"},{"reference_url":"http://secunia.com/advisories/18338","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18338"},{"reference_url":"http://secunia.com/advisories/18349","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18349"},{"reference_url":"http://secunia.com/advisories/18373","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18373"},{"reference_url":"http://secunia.com/advisories/18375","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18375"},{"reference_url":"http://secunia.com/advisories/18380","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18380"},{"reference_url":"http://secunia.com/advisories/18385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18385"},{"reference_url":"http://secunia.com/advisories/18387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18387"},{"reference_url":"http://secunia.com/advisories/18389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18389"},{"reference_url":"http://secunia.com/advisories/18398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18398"},{"reference_url":"http://secunia.com/advisories/18407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18407"},{"reference_url":"http://secunia.com/advisories/18414","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18414"},{"reference_url":"http://secunia.com/advisories/18416","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18416"},{"reference_url":"http://secunia.com/advisories/18423","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18423"},{"reference_url":"http://secunia.com/advisories/18425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18425"},{"reference_url":"http://secunia.com/advisories/18428","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18428"},{"reference_url":"http://secunia.com/advisories/18436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18436"},{"reference_url":"http://secunia.com/advisories/18448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18448"},{"reference_url":"http://secunia.com/advisories/18463","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18463"},{"reference_url":"http://secunia.com/advisories/18517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18517"},{"reference_url":"http://secunia.com/advisories/18534","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18534"},{"reference_url":"http://secunia.com/advisories/18554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18554"},{"reference_url":"http://secunia.com/advisories/18582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18582"},{"reference_url":"http://secunia.com/advisories/18642","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18642"},{"reference_url":"http://secunia.com/advisories/18644","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18644"},{"reference_url":"http://secunia.com/advisories/18674","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18674"},{"reference_url":"http://secunia.com/advisories/18675","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18675"},{"reference_url":"http://secunia.com/advisories/18679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18679"},{"reference_url":"http://secunia.com/advisories/18908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18908"},{"reference_url":"http://secunia.com/advisories/18913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18913"},{"reference_url":"http://secunia.com/advisories/19230","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19230"},{"reference_url":"http://secunia.com/advisories/19377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19377"},{"reference_url":"http://secunia.com/advisories/25729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25729"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24024","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24024"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24025","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24025"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-931","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-931"},{"reference_url":"http://www.debian.org/security/2005/dsa-932","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-932"},{"reference_url":"http://www.debian.org/security/2005/dsa-937","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-937"},{"reference_url":"http://www.debian.org/security/2005/dsa-938","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-938"},{"reference_url":"http://www.debian.org/security/2005/dsa-940","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-940"},{"reference_url":"http://www.debian.org/security/2006/dsa-936","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-936"},{"reference_url":"http://www.debian.org/security/2006/dsa-950","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-950"},{"reference_url":"http://www.debian.org/security/2006/dsa-961","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-961"},{"reference_url":"http://www.debian.org/security/2006/dsa-962","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-962"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html"},{"reference_url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/16143","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/16143"},{"reference_url":"http://www.trustix.org/errata/2006/0002/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2006/0002/"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0047","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0047"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617829","reference_id":"1617829","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617829"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076","reference_id":"346076","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3627","reference_id":"CVE-2005-3627","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3627"},{"reference_url":"https://security.gentoo.org/glsa/200601-02","reference_id":"GLSA-200601-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200601-02"},{"reference_url":"https://security.gentoo.org/glsa/200601-17","reference_id":"GLSA-200601-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200601-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:840","reference_id":"RHSA-2005:840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:868","reference_id":"RHSA-2005:868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0160","reference_id":"RHSA-2006:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0163","reference_id":"RHSA-2006:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0177","reference_id":"RHSA-2006:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0177"},{"reference_url":"https://usn.ubuntu.com/236-1/","reference_id":"USN-236-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/236-1/"},{"reference_url":"https://usn.ubuntu.com/236-2/","reference_id":"USN-236-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/236-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935583?format=json","purl":"pkg:deb/debian/poppler@0.4.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2005-3627"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bkr4-sab1-5ka2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56083?format=json","vulnerability_id":"VCID-bvmu-gq2p-jygf","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7511.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7511","reference_id":"","reference_type":"","scores":[{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.54933","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55007","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55015","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55034","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55063","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.5508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55101","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55083","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1456827","reference_id":"1456827","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1456827"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863759","reference_id":"863759","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863759"},{"reference_url":"https://security.gentoo.org/glsa/201801-17","reference_id":"GLSA-201801-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-17"},{"reference_url":"https://usn.ubuntu.com/3350-1/","reference_id":"USN-3350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3350-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935603?format=json","purl":"pkg:deb/debian/poppler@0.57.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.57.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-7511"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bvmu-gq2p-jygf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36522?format=json","vulnerability_id":"VCID-byr3-7wgc-jye9","summary":"Multiple vulnerabilities have been discovered in T1Lib, the worst\n    of which could lead to remote execution of arbitrary code.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1554.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1554.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1554","reference_id":"","reference_type":"","scores":[{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91188","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91102","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.9115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91152","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91176","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91193","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06576","scoring_system":"epss","scoring_elements":"0.91191","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554"},{"reference_url":"http://secunia.com/advisories/43823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43823"},{"reference_url":"http://secunia.com/advisories/48985","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48985"},{"reference_url":"http://securityreason.com/securityalert/8171","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8171"},{"reference_url":"http://securitytracker.com/id?1025266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025266"},{"reference_url":"http://www.foolabs.com/xpdf/download.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.foolabs.com/xpdf/download.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/376500","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/376500"},{"reference_url":"http://www.kb.cert.org/vuls/id/MAPG-8ECL8X","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MAPG-8ECL8X"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"},{"reference_url":"http://www.securityfocus.com/archive/1/517205/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517205/100/0/threaded"},{"reference_url":"http://www.toucan-system.com/advisories/tssa-2011-01.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.toucan-system.com/advisories/tssa-2011-01.txt"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0728","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0728"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=692856","reference_id":"692856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=692856"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1554","reference_id":"CVE-2011-1554","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1554"},{"reference_url":"https://security.gentoo.org/glsa/201701-57","reference_id":"GLSA-201701-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0062","reference_id":"RHSA-2012:0062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0137","reference_id":"RHSA-2012:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1201","reference_id":"RHSA-2012:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1201"},{"reference_url":"https://usn.ubuntu.com/1335-1/","reference_id":"USN-1335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2011-1554"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byr3-7wgc-jye9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79177?format=json","vulnerability_id":"VCID-c4wz-u632-eyeh","summary":"poppler: abort in PDFDoc::savePageAs in PDFDoc.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37050.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37050.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37050","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19653","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19811","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19783","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19693","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19903","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19912","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37050"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274","reference_id":"1274","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T14:19:32Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234527","reference_id":"2234527","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234527"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/dcd5bd8238ea448addd102ff045badd0aca1b990","reference_id":"dcd5bd8238ea448addd102ff045badd0aca1b990","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T14:19:32Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/dcd5bd8238ea448addd102ff045badd0aca1b990"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T14:19:32Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00022.html"},{"reference_url":"https://usn.ubuntu.com/6508-1/","reference_id":"USN-6508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6508-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935612?format=json","purl":"pkg:deb/debian/poppler@22.08.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.08.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2022-37050"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4wz-u632-eyeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57324?format=json","vulnerability_id":"VCID-cf6h-786m-rkds","summary":"Multiple vulnerabilities have been found in Poppler, allowing\n    remote attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4473","reference_id":"","reference_type":"","scores":[{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.8462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84641","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84661","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84677","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84678","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84679","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84706","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02273","scoring_system":"epss","scoring_elements":"0.84717","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024753","reference_id":"1024753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1024753"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729064","reference_id":"729064","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729064"},{"reference_url":"https://security.gentoo.org/glsa/201401-21","reference_id":"GLSA-201401-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-21"},{"reference_url":"https://usn.ubuntu.com/2958-1/","reference_id":"USN-2958-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2958-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935599?format=json","purl":"pkg:deb/debian/poppler@0.18.4-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.18.4-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2013-4473"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cf6h-786m-rkds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82344?format=json","vulnerability_id":"VCID-crcj-9bh9-7kb7","summary":"poppler: integer overflow in JPXStream::init function leading to memory consumption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9959.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9959.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9959","reference_id":"","reference_type":"","scores":[{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.80977","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.80986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81009","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81008","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81036","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81043","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.8106","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81047","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81039","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81077","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81078","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81075","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01488","scoring_system":"epss","scoring_elements":"0.81113","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732340","reference_id":"1732340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732340"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941776","reference_id":"941776","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1074","reference_id":"RHSA-2020:1074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1074"},{"reference_url":"https://usn.ubuntu.com/4646-1/","reference_id":"USN-4646-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4646-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-9959"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-crcj-9bh9-7kb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69081?format=json","vulnerability_id":"VCID-csqv-t3cr-4uap","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14517.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14517","reference_id":"","reference_type":"","scores":[{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45904","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45956","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.4595","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45896","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45845","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61417","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61372","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6137","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14517"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102687","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2018/dsa-4079","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4079"},{"reference_url":"http://www.securityfocus.com/bid/105050","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/105050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499162","reference_id":"1499162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499162"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876079","reference_id":"876079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876079"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14517","reference_id":"CVE-2017-14517","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14517"},{"reference_url":"https://usn.ubuntu.com/3433-1/","reference_id":"USN-3433-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3433-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14517"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-csqv-t3cr-4uap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31225?format=json","vulnerability_id":"VCID-ctb2-8h4y-vybd","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0166","reference_id":"","reference_type":"","scores":[{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8988","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89946","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625","reference_id":"490625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-0166"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82912?format=json","vulnerability_id":"VCID-cwyp-gapg-yufk","summary":"poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20650.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20650.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20650","reference_id":"","reference_type":"","scores":[{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57699","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.5777","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.5779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57834","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57851","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57836","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/704","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/704"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html"},{"reference_url":"http://www.securityfocus.com/bid/106459","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106459"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665263","reference_id":"1665263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665263"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917974","reference_id":"917974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917974"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20650","reference_id":"CVE-2018-20650","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/3865-1/","reference_id":"USN-3865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3865-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-20650"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwyp-gapg-yufk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31252?format=json","vulnerability_id":"VCID-czzu-9vw8-wbb2","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2"},{"reference_url":"http://j00ru.vexillium.org/?p=1507","reference_id":"","reference_type":"","scores":[],"url":"http://j00ru.vexillium.org/?p=1507"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100081.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100090.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1789.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1789","reference_id":"","reference_type":"","scores":[{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86167","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86212","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86226","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86237","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86234","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02846","scoring_system":"epss","scoring_elements":"0.86255","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1789"},{"reference_url":"http://secunia.com/advisories/52846","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52846"},{"reference_url":"http://ubuntu.com/usn/usn-1785-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1785-1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/28/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/28/8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=917109","reference_id":"917109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=917109"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1789","reference_id":"CVE-2013-1789","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1789"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/1785-1/","reference_id":"USN-1785-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1785-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2013-1789"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-czzu-9vw8-wbb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70458?format=json","vulnerability_id":"VCID-d5fj-5prg-97f4","summary":"poppler: Out-of-Bounds Read in Poppler","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32365.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32365","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23524","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23176","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23403","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23385","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23195","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23446","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23391","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32365"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102191","reference_id":"1102191","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102191"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1577","reference_id":"1577","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T14:43:55Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1577"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1792","reference_id":"1792","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T14:43:55Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1792"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357656","reference_id":"2357656","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0126","reference_id":"RHSA-2026:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0128","reference_id":"RHSA-2026:0128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0130","reference_id":"RHSA-2026:0130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0772","reference_id":"RHSA-2026:0772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0773","reference_id":"RHSA-2026:0773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0774","reference_id":"RHSA-2026:0774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0795","reference_id":"RHSA-2026:0795","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0795"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0796","reference_id":"RHSA-2026:0796","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0796"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0797","reference_id":"RHSA-2026:0797","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0797"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0799","reference_id":"RHSA-2026:0799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1090","reference_id":"RHSA-2026:1090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1091","reference_id":"RHSA-2026:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1091"},{"reference_url":"https://usn.ubuntu.com/7426-1/","reference_id":"USN-7426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7426-1/"},{"reference_url":"https://usn.ubuntu.com/7426-2/","reference_id":"USN-7426-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7426-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935619?format=json","purl":"pkg:deb/debian/poppler@25.03.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2025-32365"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5fj-5prg-97f4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31223?format=json","vulnerability_id":"VCID-dgb8-nes9-8fb7","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0147","reference_id":"","reference_type":"","scores":[{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.8494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85008","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85023","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85054","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614","reference_id":"490614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-0147"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82678?format=json","vulnerability_id":"VCID-dh3p-2g4s-wke6","summary":"poppler: heap-based buffer over-read in function Splash::blitTransparent in splash/Splash.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10872.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10872","reference_id":"","reference_type":"","scores":[{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76097","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76244","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76223","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76233","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.761","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76132","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76145","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76158","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76183","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76198","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76201","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10872"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/750","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/750"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00002.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/"},{"reference_url":"http://www.securityfocus.com/bid/107862","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107862"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1696638","reference_id":"1696638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1696638"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926530","reference_id":"926530","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926530"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10872","reference_id":"CVE-2019-10872","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10872"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935608?format=json","purl":"pkg:deb/debian/poppler@0.71.0-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-10872"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dh3p-2g4s-wke6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48283?format=json","vulnerability_id":"VCID-dn3b-smm9-63eb","summary":"Poppler does not handle fonts inside PDF files safely, allowing for\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1693.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1693","reference_id":"","reference_type":"","scores":[{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.9181","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.9185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.91865","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07598","scoring_system":"epss","scoring_elements":"0.9187","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=441722","reference_id":"441722","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=441722"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476842","reference_id":"476842","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476842"},{"reference_url":"https://security.gentoo.org/glsa/200804-18","reference_id":"GLSA-200804-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0238","reference_id":"RHSA-2008:0238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0239","reference_id":"RHSA-2008:0239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0240","reference_id":"RHSA-2008:0240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0262","reference_id":"RHSA-2008:0262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0262"},{"reference_url":"https://usn.ubuntu.com/603-1/","reference_id":"USN-603-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/603-1/"},{"reference_url":"https://usn.ubuntu.com/603-2/","reference_id":"USN-603-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/603-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935588?format=json","purl":"pkg:deb/debian/poppler@0.6.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.6.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2008-1693"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dn3b-smm9-63eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89005?format=json","vulnerability_id":"VCID-durs-kj4r-jbf2","summary":"security flaw","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2097","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21716","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21883","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22045","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22011","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22026","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21927","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21881","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21721","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2097"},{"reference_url":"http://secunia.com/advisories/17277","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17277"},{"reference_url":"http://secunia.com/advisories/18398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18398"},{"reference_url":"http://secunia.com/advisories/18407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18407"},{"reference_url":"http://secunia.com/advisories/21339","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21339"},{"reference_url":"http://secunia.com/advisories/25729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25729"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10280"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-780","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-780"},{"reference_url":"http://www.debian.org/security/2006/dsa-1136","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1136"},{"reference_url":"http://www.debian.org/security/2006/dsa-936","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-936"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:138","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:138"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_19_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_19_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-670.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-670.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-671.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-671.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-706.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-706.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-708.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-708.html"},{"reference_url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/14529","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14529"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617684","reference_id":"1617684","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617684"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462","reference_id":"322462","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322462"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464","reference_id":"324464","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324464"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2097","reference_id":"CVE-2005-2097","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:670","reference_id":"RHSA-2005:670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:671","reference_id":"RHSA-2005:671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:706","reference_id":"RHSA-2005:706","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:706"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:708","reference_id":"RHSA-2005:708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:708"},{"reference_url":"https://usn.ubuntu.com/163-1/","reference_id":"USN-163-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/163-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935577?format=json","purl":"pkg:deb/debian/poppler@0.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2005-2097"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-durs-kj4r-jbf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87913?format=json","vulnerability_id":"VCID-e6c9-n7zk-3bfz","summary":"poppler: heap based buffer overflow in DCTStream.cc","references":[{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/poppler/DCTStream.cc?id=fc071d800cb4329a3ccf898d7bf16b4db7323ad8","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/poppler/DCTStream.cc?id=fc071d800cb4329a3ccf898d7bf16b4db7323ad8"},{"reference_url":"http://comments.gmane.org/gmane.comp.security.oss.general/11132","reference_id":"","reference_type":"","scores":[],"url":"http://comments.gmane.org/gmane.comp.security.oss.general/11132"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-5110.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-5110.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-5110","reference_id":"","reference_type":"","scores":[{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73722","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73592","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73686","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73678","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73711","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73721","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-5110"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=26280","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=26280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110"},{"reference_url":"http://secunia.com/advisories/59857","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59857"},{"reference_url":"https://www.suse.com/support/update/announcement/2014/suse-su-20140817-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2014/suse-su-20140817-1.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=647377","reference_id":"647377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=647377"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722705","reference_id":"722705","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722705"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-5110","reference_id":"CVE-2010-5110","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-5110"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935594?format=json","purl":"pkg:deb/debian/poppler@0.16.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.16.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2010-5110"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6c9-n7zk-3bfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93941?format=json","vulnerability_id":"VCID-ebyg-yhza-wkaq","summary":"A stack-based buffer over-read exists in PostScriptFunction::transform in Function.cc in Xpdf 4.01.01 because GfxSeparationColorSpace and GfxDeviceNColorSpace mishandle tint transform functions. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12493","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52767","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52818","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52846","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52858","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52827","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52836","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12493"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935609?format=json","purl":"pkg:deb/debian/poppler@0.44.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.44.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-12493"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ebyg-yhza-wkaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81122?format=json","vulnerability_id":"VCID-enu8-gjre-fbap","summary":"poppler: uncontrolled recursion in pdfinfo and pdftops","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-23804.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-23804.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-23804","reference_id":"","reference_type":"","scores":[{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49843","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.4988","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49859","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49898","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49944","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49904","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49911","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49864","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-23804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23804"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234526","reference_id":"2234526","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234526"},{"reference_url":"https://usn.ubuntu.com/6508-1/","reference_id":"USN-6508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6508-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935611?format=json","purl":"pkg:deb/debian/poppler@20.09.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2020-23804"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-enu8-gjre-fbap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60453?format=json","vulnerability_id":"VCID-ervb-318m-tygv","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14975.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14975","reference_id":"","reference_type":"","scores":[{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.7795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78034","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77957","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77967","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78026","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78008","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78042","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14975"},{"reference_url":"https://bugzilla.freedesktop.org/show_bug.cgi?id=102653","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.freedesktop.org/show_bug.cgi?id=102653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4079","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500343","reference_id":"1500343","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500343"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877957","reference_id":"877957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877957"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14975","reference_id":"CVE-2017-14975","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14975"},{"reference_url":"https://security.gentoo.org/glsa/201804-03","reference_id":"GLSA-201804-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-03"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14975"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ervb-318m-tygv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83020?format=json","vulnerability_id":"VCID-ervj-1sdg-b3bm","summary":"poppler: pdfdetach utility does not validate save paths","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19060.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19060","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35252","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35221","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35197","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35235","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34829","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649450","reference_id":"1649450","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649450"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913182","reference_id":"913182","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://usn.ubuntu.com/3837-1/","reference_id":"USN-3837-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3837-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-19060"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ervj-1sdg-b3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60455?format=json","vulnerability_id":"VCID-ex2h-ahg3-s7b9","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14977.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14977","reference_id":"","reference_type":"","scores":[{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.7795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78034","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77957","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77967","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78026","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78008","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78042","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14977"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=103045","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=103045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4079","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500344","reference_id":"1500344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500344"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877952","reference_id":"877952","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877952"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14977","reference_id":"CVE-2017-14977","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14977"},{"reference_url":"https://security.gentoo.org/glsa/201804-03","reference_id":"GLSA-201804-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-03"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14977"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ex2h-ahg3-s7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34873?format=json","vulnerability_id":"VCID-fct6-695j-t7bs","summary":"PDFKit and ImageKits are vulnerable to an integer overflow and a stack\n    overflow allowing for the user-assisted execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3387","reference_id":"","reference_type":"","scores":[{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92529","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92541","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92559","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92565","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92578","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=248194","reference_id":"248194","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=248194"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460","reference_id":"435460","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462","reference_id":"435462","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462"},{"reference_url":"https://security.gentoo.org/glsa/200709-12","reference_id":"GLSA-200709-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200709-12"},{"reference_url":"https://security.gentoo.org/glsa/200709-17","reference_id":"GLSA-200709-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200709-17"},{"reference_url":"https://security.gentoo.org/glsa/200710-08","reference_id":"GLSA-200710-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-08"},{"reference_url":"https://security.gentoo.org/glsa/200710-20","reference_id":"GLSA-200710-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0720","reference_id":"RHSA-2007:0720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0729","reference_id":"RHSA-2007:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0730","reference_id":"RHSA-2007:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0731","reference_id":"RHSA-2007:0731","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0731"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0732","reference_id":"RHSA-2007:0732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0735","reference_id":"RHSA-2007:0735","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0735"},{"reference_url":"https://usn.ubuntu.com/496-1/","reference_id":"USN-496-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/496-1/"},{"reference_url":"https://usn.ubuntu.com/496-2/","reference_id":"USN-496-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/496-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935586?format=json","purl":"pkg:deb/debian/poppler@0.5.4-6.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.5.4-6.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2007-3387"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fct6-695j-t7bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31230?format=json","vulnerability_id":"VCID-gbm8-vcwy-u3g2","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1179","reference_id":"","reference_type":"","scores":[{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96426","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.9644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96457","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.9647","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96473","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96475","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27841","scoring_system":"epss","scoring_elements":"0.96477","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495889","reference_id":"495889","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495889"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-1179"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88236?format=json","vulnerability_id":"VCID-gbuy-ru9c-h3en","summary":"poppler/evince: DoS via crafted PDF file","references":[{"reference_url":"http://bugs.freedesktop.org/show_bug.cgi?id=19790","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.freedesktop.org/show_bug.cgi?id=19790"},{"reference_url":"http://lists.freedesktop.org/archives/poppler/2009-January/004406.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/poppler/2009-January/004406.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0755.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0755","reference_id":"","reference_type":"","scores":[{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95901","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95938","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95949","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95917","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95921","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23185","scoring_system":"epss","scoring_elements":"0.95936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.24435","scoring_system":"epss","scoring_elements":"0.9613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.24435","scoring_system":"epss","scoring_elements":"0.96128","published_at":"2026-04-24T12:55:00Z"},{"value":"0.24435","scoring_system":"epss","scoring_elements":"0.96129","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755"},{"reference_url":"http://secunia.com/advisories/33853","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33853"},{"reference_url":"http://secunia.com/advisories/35685","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35685"},{"reference_url":"http://secunia.com/advisories/37114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/37114"},{"reference_url":"http://wiki.rpath.com/Advisories:rPSA-2009-0059","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/Advisories:rPSA-2009-0059"},{"reference_url":"http://www.debian.org/security/2009/dsa-1941","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1941"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/02/13/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2009/02/13/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/02/19/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2009/02/19/2"},{"reference_url":"http://www.securityfocus.com/archive/1/502761/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/502761/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/33749","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33749"},{"reference_url":"http://www.ubuntu.com/usn/USN-850-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-850-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=488337","reference_id":"488337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=488337"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518478","reference_id":"518478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518478"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0755","reference_id":"CVE-2009-0755","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0755"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32800.txt","reference_id":"CVE-2009-0756;OSVDB-51914;CVE-2009-0755","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32800.txt"},{"reference_url":"https://www.securityfocus.com/bid/33749/info","reference_id":"CVE-2009-0756;OSVDB-51914;CVE-2009-0755","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/33749/info"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-0755"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbuy-ru9c-h3en"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31248?format=json","vulnerability_id":"VCID-gc6w-tctk-nycd","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4653.json"},{"reference_url":"https://access.redhat.com/security/cve/cve-2010-4653","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/cve-2010-4653"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4653","reference_id":"","reference_type":"","scores":[{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.738","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73729","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00782","scoring_system":"epss","scoring_elements":"0.73766","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4653"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201310-03.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201310-03.xml"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2010-4653","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2010-4653"},{"reference_url":"http://www.securityfocus.com/bid/45948","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45948"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=672165","reference_id":"672165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=672165"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4653","reference_id":"CVE-2010-4653","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4653"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935594?format=json","purl":"pkg:deb/debian/poppler@0.16.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.16.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2010-4653"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gc6w-tctk-nycd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82511?format=json","vulnerability_id":"VCID-gfxh-3er7-zyam","summary":"xpdf: buffer over-read via crafted PDF document leads to DoS or memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12360.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12360","reference_id":"","reference_type":"","scores":[{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57568","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57596","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.576","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57602","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57599","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57536","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12360"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850876","reference_id":"1850876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850876"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935604?format=json","purl":"pkg:deb/debian/poppler@0.38.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.38.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-12360"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gfxh-3er7-zyam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56087?format=json","vulnerability_id":"VCID-gt34-muf6-abc7","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9865.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9865","reference_id":"","reference_type":"","scores":[{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73288","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73427","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73416","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73293","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73329","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73338","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73381","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73389","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73383","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466435","reference_id":"1466435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466435"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867477","reference_id":"867477","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867477"},{"reference_url":"https://security.gentoo.org/glsa/201801-17","reference_id":"GLSA-201801-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-17"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935603?format=json","purl":"pkg:deb/debian/poppler@0.57.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.57.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-9865"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gt34-muf6-abc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69082?format=json","vulnerability_id":"VCID-h1ka-xthk-rug9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14518.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14518","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5064","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50667","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50652","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.506","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50608","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57372","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57374","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.5739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.5724","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57322","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57345","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57321","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14518"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102688","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2018/dsa-4079","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499163","reference_id":"1499163","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499163"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876082","reference_id":"876082","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876082"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14518","reference_id":"CVE-2017-14518","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14518"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14518"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h1ka-xthk-rug9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49987?format=json","vulnerability_id":"VCID-h3q1-dbx2-hubv","summary":"A vulnerability has been discovered in Poppler which could allow for arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38784.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38784","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24506","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24461","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26228","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26152","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26098","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38784"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38784","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38784"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018971","reference_id":"1018971","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018971"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124527","reference_id":"2124527","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124527"},{"reference_url":"https://security.archlinux.org/AVG-2812","reference_id":"AVG-2812","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2812"},{"reference_url":"https://security.gentoo.org/glsa/202209-21","reference_id":"GLSA-202209-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2259","reference_id":"RHSA-2023:2259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2810","reference_id":"RHSA-2023:2810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2810"},{"reference_url":"https://usn.ubuntu.com/5606-1/","reference_id":"USN-5606-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5606-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935615?format=json","purl":"pkg:deb/debian/poppler@22.08.0-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.08.0-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2022-38784"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h3q1-dbx2-hubv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83934?format=json","vulnerability_id":"VCID-hf11-8tk1-5kc4","summary":"poppler: Memory corruption via Gfx.cc infinite loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14929.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14929","reference_id":"","reference_type":"","scores":[{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41128","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41171","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41142","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.4097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40957","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64589","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64677","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64642","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64629","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14929"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102969","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14929"},{"reference_url":"https://www.debian.org/security/2018/dsa-4097","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4097"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499167","reference_id":"1499167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499167"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877222","reference_id":"877222","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877222"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14929","reference_id":"CVE-2017-14929","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14929"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14929"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hf11-8tk1-5kc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82927?format=json","vulnerability_id":"VCID-hmbq-4c5b-ukd7","summary":"poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20481.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20481.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20481","reference_id":"","reference_type":"","scores":[{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78778","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78901","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.7885","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78885","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78816","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78825","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78831","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78837","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78856","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0119","scoring_system":"epss","scoring_elements":"0.78853","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20481"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/692","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/692"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/merge_requests/143","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/merge_requests/143"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html"},{"reference_url":"http://www.securityfocus.com/bid/106321","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106321"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665266","reference_id":"1665266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665266"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917325","reference_id":"917325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917325"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20481","reference_id":"CVE-2018-20481","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/3865-1/","reference_id":"USN-3865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3865-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935605?format=json","purl":"pkg:deb/debian/poppler@0.71.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-20481"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmbq-4c5b-ukd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83958?format=json","vulnerability_id":"VCID-hszt-6bxr-syfe","summary":"poppler: Floating point exception in the ImageStream class","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14617.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14617","reference_id":"","reference_type":"","scores":[{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66908","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67044","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67016","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66972","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67008","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67028","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67014","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66983","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14617"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102854","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14617"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499905","reference_id":"1499905","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499905"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876385","reference_id":"876385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876385"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14617","reference_id":"CVE-2017-14617","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14617"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14617"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hszt-6bxr-syfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84282?format=json","vulnerability_id":"VCID-jauh-5qga-hucw","summary":"poppler: Stack exhaustion due to infinite recursive call in pdfunite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7515.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7515","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43955","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4404","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44146","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44193","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44184","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44113","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7515"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459066","reference_id":"1459066","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459066"},{"reference_url":"https://usn.ubuntu.com/3350-1/","reference_id":"USN-3350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3350-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935603?format=json","purl":"pkg:deb/debian/poppler@0.57.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.57.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-7515"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jauh-5qga-hucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82909?format=json","vulnerability_id":"VCID-jc37-xtrj-p3cm","summary":"poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20662.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20662","reference_id":"","reference_type":"","scores":[{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69292","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69224","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69276","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69284","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69148","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.6915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.6924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69198","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69237","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69245","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/commit/9fd5ec0e6e5f763b190f2a55ceb5427cfe851d5f","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/commit/9fd5ec0e6e5f763b190f2a55ceb5427cfe851d5f"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/706","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/706"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BI7NLDN2HUEU4ZW3D7XPHOAEGT2CKDRO/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BI7NLDN2HUEU4ZW3D7XPHOAEGT2CKDRO/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWP5XSUG6GNRI75NYKF53KIB2CZY6QQ6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWP5XSUG6GNRI75NYKF53KIB2CZY6QQ6/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665273","reference_id":"1665273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665273"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918158","reference_id":"918158","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918158"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20662","reference_id":"CVE-2018-20662","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935605?format=json","purl":"pkg:deb/debian/poppler@0.71.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-20662"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jc37-xtrj-p3cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56085?format=json","vulnerability_id":"VCID-jd42-3thk-rqhr","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9406.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9406","reference_id":"","reference_type":"","scores":[{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77441","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.7758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77565","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77472","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77453","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77482","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77517","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77524","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1458701","reference_id":"1458701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1458701"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864010","reference_id":"864010","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864010"},{"reference_url":"https://security.gentoo.org/glsa/201801-17","reference_id":"GLSA-201801-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-17"},{"reference_url":"https://usn.ubuntu.com/3350-1/","reference_id":"USN-3350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3350-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935603?format=json","purl":"pkg:deb/debian/poppler@0.57.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.57.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-9406"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jd42-3thk-rqhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31231?format=json","vulnerability_id":"VCID-jvuz-2phs-87du","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1180","reference_id":"","reference_type":"","scores":[{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92498","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92526","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.9253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92547","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92552","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08831","scoring_system":"epss","scoring_elements":"0.92548","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495892","reference_id":"495892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495892"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-1180"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60452?format=json","vulnerability_id":"VCID-jw5j-xk5g-v3b1","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000456.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000456","reference_id":"","reference_type":"","scores":[{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72545","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.7254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72434","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72485","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72467","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72457","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00719","scoring_system":"epss","scoring_elements":"0.72508","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000456"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=103116","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=103116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000456"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00001.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4097","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4097"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1531382","reference_id":"1531382","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1531382"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.60.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.60.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.60.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000456","reference_id":"CVE-2017-1000456","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000456"},{"reference_url":"https://security.gentoo.org/glsa/201804-03","reference_id":"GLSA-201804-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-03"},{"reference_url":"https://usn.ubuntu.com/3517-1/","reference_id":"USN-3517-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3517-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-1000456"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jw5j-xk5g-v3b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82698?format=json","vulnerability_id":"VCID-k1uz-1eqt-pbc6","summary":"poppler: buffer overflow in HtmlOutputDev::page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-18839.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-18839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-18839","reference_id":"","reference_type":"","scores":[{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39864","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.40012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39745","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.3973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.40038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.40011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.40025","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.40035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.40028","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39999","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39919","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-18839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18839"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234524","reference_id":"2234524","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234524"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/742","reference_id":"742","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:29:54Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/742"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2020-18839"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k1uz-1eqt-pbc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57326?format=json","vulnerability_id":"VCID-k44f-gsg9-eqce","summary":"Multiple vulnerabilities have been found in Poppler, allowing\n    remote attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7296.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7296","reference_id":"","reference_type":"","scores":[{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85224","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85257","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85301","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85317","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85314","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85336","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85344","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7296"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048199","reference_id":"1048199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048199"},{"reference_url":"https://security.gentoo.org/glsa/201401-21","reference_id":"GLSA-201401-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-21"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2013-7296"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k44f-gsg9-eqce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60454?format=json","vulnerability_id":"VCID-kf69-av43-wffs","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14976.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14976","reference_id":"","reference_type":"","scores":[{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.77912","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.7805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.78004","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.77997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.78029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.78037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.77919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.77929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.77956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.7796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.77987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.7797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01093","scoring_system":"epss","scoring_elements":"0.77969","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14976"},{"reference_url":"https://bugzilla.freedesktop.org/show_bug.cgi?id=102724","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.freedesktop.org/show_bug.cgi?id=102724"},{"reference_url":"https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf","reference_id":"","reference_type":"","scores":[],"url":"https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4079","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500345","reference_id":"1500345","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500345"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877954","reference_id":"877954","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877954"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14976","reference_id":"CVE-2017-14976","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14976"},{"reference_url":"https://security.gentoo.org/glsa/201804-03","reference_id":"GLSA-201804-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-03"},{"reference_url":"https://usn.ubuntu.com/3517-1/","reference_id":"USN-3517-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3517-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14976"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kf69-av43-wffs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61422?format=json","vulnerability_id":"VCID-kgk7-hqby-wkez","summary":"Poppler and various KDE components are vulnerable to multiple memory\n    management issues possibly resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4352.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4352","reference_id":"","reference_type":"","scores":[{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.9618","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96196","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96199","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96209","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96212","published_at":"2026-04-09T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96226","published_at":"2026-04-16T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96231","published_at":"2026-04-18T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96232","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96234","published_at":"2026-04-26T12:55:00Z"},{"value":"0.25469","scoring_system":"epss","scoring_elements":"0.96235","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=345101","reference_id":"345101","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=345101"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628","reference_id":"450628","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629","reference_id":"450629","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629"},{"reference_url":"https://security.gentoo.org/glsa/200711-22","reference_id":"GLSA-200711-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1021","reference_id":"RHSA-2007:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1022","reference_id":"RHSA-2007:1022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1024","reference_id":"RHSA-2007:1024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1025","reference_id":"RHSA-2007:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1026","reference_id":"RHSA-2007:1026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1027","reference_id":"RHSA-2007:1027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1029","reference_id":"RHSA-2007:1029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1030","reference_id":"RHSA-2007:1030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1030"},{"reference_url":"https://usn.ubuntu.com/542-1/","reference_id":"USN-542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/542-1/"},{"reference_url":"https://usn.ubuntu.com/542-2/","reference_id":"USN-542-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/542-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935587?format=json","purl":"pkg:deb/debian/poppler@0.6.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.6.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2007-4352"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kgk7-hqby-wkez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83491?format=json","vulnerability_id":"VCID-kre4-9v6u-3ked","summary":"poppler: NULL pointer dereference in Annot.h:AnnotPath::getCoordsLength() allows for denial of service via crafted PDF","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3505","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10768.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10768.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10768","reference_id":"","reference_type":"","scores":[{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82945","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83049","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.8308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83008","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83047","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83046","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10768"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=106408","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=106408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576169","reference_id":"1576169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576169"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10768","reference_id":"CVE-2018-10768","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3647-1/","reference_id":"USN-3647-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3647-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935604?format=json","purl":"pkg:deb/debian/poppler@0.38.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.38.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-10768"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kre4-9v6u-3ked"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69080?format=json","vulnerability_id":"VCID-kwa4-641f-ducs","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9776.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9776","reference_id":"","reference_type":"","scores":[{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79262","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79388","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79293","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79338","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.7931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79337","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466443","reference_id":"1466443","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466443"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865679","reference_id":"865679","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865679"},{"reference_url":"https://security.archlinux.org/ASA-201706-33","reference_id":"ASA-201706-33","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-33"},{"reference_url":"https://security.archlinux.org/AVG-326","reference_id":"AVG-326","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2550","reference_id":"RHSA-2017:2550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2551","reference_id":"RHSA-2017:2551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2551"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935603?format=json","purl":"pkg:deb/debian/poppler@0.57.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.57.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-9776"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwa4-641f-ducs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49937?format=json","vulnerability_id":"VCID-mg1z-d7y8-dfaj","summary":"KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n    making them vulnerable to the execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3624","reference_id":"","reference_type":"","scores":[{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91727","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91676","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91691","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91703","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.9171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91716","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91725","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91726","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07357","scoring_system":"epss","scoring_elements":"0.91729","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3624"},{"reference_url":"http://scary.beasts.org/security/CESA-2005-003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2005-003.txt"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624"},{"reference_url":"http://secunia.com/advisories/18147","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18147"},{"reference_url":"http://secunia.com/advisories/18303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18303"},{"reference_url":"http://secunia.com/advisories/18312","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18312"},{"reference_url":"http://secunia.com/advisories/18313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18313"},{"reference_url":"http://secunia.com/advisories/18329","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18329"},{"reference_url":"http://secunia.com/advisories/18332","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18332"},{"reference_url":"http://secunia.com/advisories/18334","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18334"},{"reference_url":"http://secunia.com/advisories/18338","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18338"},{"reference_url":"http://secunia.com/advisories/18349","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18349"},{"reference_url":"http://secunia.com/advisories/18373","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18373"},{"reference_url":"http://secunia.com/advisories/18375","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18375"},{"reference_url":"http://secunia.com/advisories/18380","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18380"},{"reference_url":"http://secunia.com/advisories/18385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18385"},{"reference_url":"http://secunia.com/advisories/18387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18387"},{"reference_url":"http://secunia.com/advisories/18389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18389"},{"reference_url":"http://secunia.com/advisories/18398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18398"},{"reference_url":"http://secunia.com/advisories/18407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18407"},{"reference_url":"http://secunia.com/advisories/18414","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18414"},{"reference_url":"http://secunia.com/advisories/18416","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18416"},{"reference_url":"http://secunia.com/advisories/18423","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18423"},{"reference_url":"http://secunia.com/advisories/18425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18425"},{"reference_url":"http://secunia.com/advisories/18428","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18428"},{"reference_url":"http://secunia.com/advisories/18436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18436"},{"reference_url":"http://secunia.com/advisories/18448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18448"},{"reference_url":"http://secunia.com/advisories/18463","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18463"},{"reference_url":"http://secunia.com/advisories/18517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18517"},{"reference_url":"http://secunia.com/advisories/18534","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18534"},{"reference_url":"http://secunia.com/advisories/18554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18554"},{"reference_url":"http://secunia.com/advisories/18582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18582"},{"reference_url":"http://secunia.com/advisories/18642","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18642"},{"reference_url":"http://secunia.com/advisories/18644","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18644"},{"reference_url":"http://secunia.com/advisories/18674","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18674"},{"reference_url":"http://secunia.com/advisories/18675","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18675"},{"reference_url":"http://secunia.com/advisories/18679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18679"},{"reference_url":"http://secunia.com/advisories/18908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18908"},{"reference_url":"http://secunia.com/advisories/18913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18913"},{"reference_url":"http://secunia.com/advisories/19230","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19230"},{"reference_url":"http://secunia.com/advisories/19377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19377"},{"reference_url":"http://secunia.com/advisories/25729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25729"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24022","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24022"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-931","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-931"},{"reference_url":"http://www.debian.org/security/2005/dsa-932","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-932"},{"reference_url":"http://www.debian.org/security/2005/dsa-937","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-937"},{"reference_url":"http://www.debian.org/security/2005/dsa-938","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-938"},{"reference_url":"http://www.debian.org/security/2005/dsa-940","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-940"},{"reference_url":"http://www.debian.org/security/2006/dsa-936","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-936"},{"reference_url":"http://www.debian.org/security/2006/dsa-950","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-950"},{"reference_url":"http://www.debian.org/security/2006/dsa-961","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-961"},{"reference_url":"http://www.debian.org/security/2006/dsa-962","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-962"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html"},{"reference_url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/16143","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/16143"},{"reference_url":"http://www.trustix.org/errata/2006/0002/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2006/0002/"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0047","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0047"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617826","reference_id":"1617826","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617826"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076","reference_id":"346076","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3624","reference_id":"CVE-2005-3624","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3624"},{"reference_url":"https://security.gentoo.org/glsa/200601-02","reference_id":"GLSA-200601-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200601-02"},{"reference_url":"https://security.gentoo.org/glsa/200601-17","reference_id":"GLSA-200601-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200601-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:840","reference_id":"RHSA-2005:840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:868","reference_id":"RHSA-2005:868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0160","reference_id":"RHSA-2006:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0163","reference_id":"RHSA-2006:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0177","reference_id":"RHSA-2006:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0177"},{"reference_url":"https://usn.ubuntu.com/236-1/","reference_id":"USN-236-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/236-1/"},{"reference_url":"https://usn.ubuntu.com/236-2/","reference_id":"USN-236-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/236-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935583?format=json","purl":"pkg:deb/debian/poppler@0.4.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2005-3624"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mg1z-d7y8-dfaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90704?format=json","vulnerability_id":"VCID-mq43-5wd8-ayan","summary":"xpdf infinite loop DoS","references":[{"reference_url":"http://docs.info.apple.com/article.html?artnum=305214","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=305214"},{"reference_url":"http://projects.info-pull.com/moab/MOAB-06-01-2007.html","reference_id":"","reference_type":"","scores":[],"url":"http://projects.info-pull.com/moab/MOAB-06-01-2007.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0104.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0104","reference_id":"","reference_type":"","scores":[{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95342","published_at":"2026-04-29T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95314","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95317","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95324","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95331","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95335","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.19012","scoring_system":"epss","scoring_elements":"0.95341","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104"},{"reference_url":"http://secunia.com/advisories/23791","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23791"},{"reference_url":"http://secunia.com/advisories/23799","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23799"},{"reference_url":"http://secunia.com/advisories/23808","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23808"},{"reference_url":"http://secunia.com/advisories/23813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23813"},{"reference_url":"http://secunia.com/advisories/23815","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23815"},{"reference_url":"http://secunia.com/advisories/23839","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23839"},{"reference_url":"http://secunia.com/advisories/23844","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23844"},{"reference_url":"http://secunia.com/advisories/23876","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23876"},{"reference_url":"http://secunia.com/advisories/24204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24204"},{"reference_url":"http://secunia.com/advisories/24479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24479"},{"reference_url":"http://securitytracker.com/id?1017514","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017514"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31364","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31364"},{"reference_url":"https://issues.rpath.com/browse/RPL-964","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-964"},{"reference_url":"http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html","reference_id":"","reference_type":"","scores":[],"url":"http://support.novell.com/techcenter/psdb/44d7cb9b669d58e0ce5aa5d7ab2c7c53.html"},{"reference_url":"http://www.kde.org/info/security/advisory-20070115-1.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20070115-1.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:018","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:018"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:019","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:019"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:020","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:020"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:021","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:021"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:022","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:022"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:024","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:024"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_3_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_3_sr.html"},{"reference_url":"http://www.securityfocus.com/archive/1/457055/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/457055/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/21910","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21910"},{"reference_url":"http://www.securitytracker.com/id?1017749","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017749"},{"reference_url":"http://www.ubuntu.com/usn/usn-410-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-410-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-410-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-410-2"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0203","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0203"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0212","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0212"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0244","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0244"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0930","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0930"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852","reference_id":"406852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406852"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=428126","reference_id":"428126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=428126"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1_pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0_pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0104","reference_id":"CVE-2007-0104","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0104"},{"reference_url":"https://usn.ubuntu.com/410-1/","reference_id":"USN-410-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/410-1/"},{"reference_url":"https://usn.ubuntu.com/410-2/","reference_id":"USN-410-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/410-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935585?format=json","purl":"pkg:deb/debian/poppler@0.4.5-5.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.5-5.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2007-0104"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mq43-5wd8-ayan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69083?format=json","vulnerability_id":"VCID-mqt3-g77k-xqer","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14519.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14519","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31056","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3143","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62826","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62914","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62878","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14519"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102701","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2018/dsa-4079","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499165","reference_id":"1499165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499165"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876086","reference_id":"876086","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876086"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14519","reference_id":"CVE-2017-14519","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14519"},{"reference_url":"https://usn.ubuntu.com/3433-1/","reference_id":"USN-3433-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3433-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14519"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqt3-g77k-xqer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82518?format=json","vulnerability_id":"VCID-myjj-5fsv-sybj","summary":"poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12293.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12293","reference_id":"","reference_type":"","scores":[{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76282","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76295","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76328","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76372","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00948","scoring_system":"epss","scoring_elements":"0.76427","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1713582","reference_id":"1713582","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1713582"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929423","reference_id":"929423","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1074","reference_id":"RHSA-2020:1074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1074"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935608?format=json","purl":"pkg:deb/debian/poppler@0.71.0-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-12293"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myjj-5fsv-sybj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78188?format=json","vulnerability_id":"VCID-n1sx-y7xc-kqfb","summary":"poppler: NULL pointer dereference in `FoFiType1C::convertToType1`","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36024.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36024.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-36024","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26481","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26145","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26203","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26305","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26335","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26308","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-36024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36024"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1016","reference_id":"1016","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T17:56:32Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231520","reference_id":"2231520","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231520"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T17:56:32Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00017.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2979","reference_id":"RHSA-2024:2979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2979"},{"reference_url":"https://usn.ubuntu.com/6299-1/","reference_id":"USN-6299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6299-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935612?format=json","purl":"pkg:deb/debian/poppler@22.08.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.08.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2020-36024"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1sx-y7xc-kqfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93837?format=json","vulnerability_id":"VCID-ncat-8jz5-m7e5","summary":"An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec at Function.cc for the psOpIdiv case.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10018","reference_id":"","reference_type":"","scores":[{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55319","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55404","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55369","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55398","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55408","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55387","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55368","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10018"},{"reference_url":"https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276","reference_id":"","reference_type":"","scores":[],"url":"https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926133","reference_id":"926133","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926133"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:4.01.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:4.01.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:4.01.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10018","reference_id":"CVE-2019-10018","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10018"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935603?format=json","purl":"pkg:deb/debian/poppler@0.57.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.57.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-10018"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ncat-8jz5-m7e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31245?format=json","vulnerability_id":"VCID-neqs-cg1p-7bb7","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch"},{"reference_url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf","reference_id":"","reference_type":"","scores":[],"url":"http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3702","reference_id":"","reference_type":"","scores":[{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86421","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86345","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86374","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86387","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.8638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86397","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86402","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86415","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02916","scoring_system":"epss","scoring_elements":"0.86424","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702"},{"reference_url":"http://secunia.com/advisories/42141","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42141"},{"reference_url":"http://secunia.com/advisories/42357","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42357"},{"reference_url":"http://secunia.com/advisories/42397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42397"},{"reference_url":"http://secunia.com/advisories/42691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42691"},{"reference_url":"http://secunia.com/advisories/43079","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43079"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720"},{"reference_url":"http://www.debian.org/security/2010/dsa-2119","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2119"},{"reference_url":"http://www.debian.org/security/2010/dsa-2135","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2135"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/04/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/04/6"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0749.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0749.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0750.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0750.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0751.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0751.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0752.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0752.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0753.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0753.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0754.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0754.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0755.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0755.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0859.html"},{"reference_url":"http://www.securityfocus.com/bid/43845","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43845"},{"reference_url":"http://www.ubuntu.com/usn/USN-1005-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1005-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2897","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2897"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3097","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3097"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0230","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0230"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=595245","reference_id":"595245","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=595245"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165","reference_id":"599165","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3702","reference_id":"CVE-2010-3702","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3702"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://security.gentoo.org/glsa/201402-17","reference_id":"GLSA-201402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0749","reference_id":"RHSA-2010:0749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0750","reference_id":"RHSA-2010:0750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0751","reference_id":"RHSA-2010:0751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0752","reference_id":"RHSA-2010:0752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0753","reference_id":"RHSA-2010:0753","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0754","reference_id":"RHSA-2010:0754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0755","reference_id":"RHSA-2010:0755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0859","reference_id":"RHSA-2010:0859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1201","reference_id":"RHSA-2012:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1201"},{"reference_url":"https://usn.ubuntu.com/1005-1/","reference_id":"USN-1005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935595?format=json","purl":"pkg:deb/debian/poppler@0.12.4-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.4-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2010-3702"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-neqs-cg1p-7bb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31241?format=json","vulnerability_id":"VCID-ng15-dzek-kyda","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3607.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3607","reference_id":"","reference_type":"","scores":[{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91315","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.9133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91337","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.9139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.914","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06855","scoring_system":"epss","scoring_elements":"0.91397","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526924","reference_id":"526924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526924"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935591?format=json","purl":"pkg:deb/debian/poppler@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-3607"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ng15-dzek-kyda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31250?format=json","vulnerability_id":"VCID-ngzc-42z2-8yae","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2142.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2142","reference_id":"","reference_type":"","scores":[{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60519","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.7993","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79959","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79968","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79994","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79971","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79941","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487773","reference_id":"487773","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487773"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=789936","reference_id":"789936","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=789936"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935597?format=json","purl":"pkg:deb/debian/poppler@0.18.4-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.18.4-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2012-2142"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngzc-42z2-8yae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79175?format=json","vulnerability_id":"VCID-nqqu-29qr-wfec","summary":"poppler: reachable assertion due to a failure in markObject()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37052.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37052.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37052","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07467","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07547","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07498","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07469","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07509","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07534","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0752","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07429","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07418","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37052"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278","reference_id":"1278","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:06:03Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234530","reference_id":"2234530","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234530"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/8677500399fc2548fa816b619580c2c07915a98c","reference_id":"8677500399fc2548fa816b619580c2c07915a98c","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:06:03Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/8677500399fc2548fa816b619580c2c07915a98c"},{"reference_url":"https://usn.ubuntu.com/6508-1/","reference_id":"USN-6508-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6508-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935612?format=json","purl":"pkg:deb/debian/poppler@22.08.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.08.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2022-37052"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nqqu-29qr-wfec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50774?format=json","vulnerability_id":"VCID-p219-w8nj-qqg7","summary":"Poppler is affected by a memory management issue, which could lead to the\n    execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2950.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2950.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2950","reference_id":"","reference_type":"","scores":[{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.939","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93836","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93844","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93854","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93873","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93874","published_at":"2026-04-12T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93902","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12333","scoring_system":"epss","scoring_elements":"0.93904","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2950"},{"reference_url":"http://secunia.com/advisories/30963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30963"},{"reference_url":"http://secunia.com/advisories/31002","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31002"},{"reference_url":"http://secunia.com/advisories/31167","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31167"},{"reference_url":"http://secunia.com/advisories/31267","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31267"},{"reference_url":"http://secunia.com/advisories/31405","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31405"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200807-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200807-04.xml"},{"reference_url":"http://securityreason.com/securityalert/3977","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/3977"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43619","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43619"},{"reference_url":"https://www.exploit-db.com/exploits/6032","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/6032"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00161.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00161.html"},{"reference_url":"http://wiki.rpath.com/Advisories:rPSA-2008-0223","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/Advisories:rPSA-2008-0223"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:146","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:146"},{"reference_url":"http://www.ocert.org/advisories/ocert-2008-007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.ocert.org/advisories/ocert-2008-007.html"},{"reference_url":"http://www.securityfocus.com/archive/1/493980/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/493980/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/494142/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/494142/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/30107","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30107"},{"reference_url":"http://www.securitytracker.com/id?1020435","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020435"},{"reference_url":"http://www.ubuntu.com/usn/usn-631-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-631-1"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2024/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2024/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=454277","reference_id":"454277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=454277"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489756","reference_id":"489756","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489756"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2950","reference_id":"CVE-2008-2950","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-2950"},{"reference_url":"https://security.gentoo.org/glsa/200807-04","reference_id":"GLSA-200807-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200807-04"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6032.py","reference_id":"OSVDB-46806;CVE-2008-2950","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/6032.py"},{"reference_url":"https://usn.ubuntu.com/631-1/","reference_id":"USN-631-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/631-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935589?format=json","purl":"pkg:deb/debian/poppler@0.8.4-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.8.4-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2008-2950"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p219-w8nj-qqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83987?format=json","vulnerability_id":"VCID-pc5k-98kh-suce","summary":"poppler: NULL pointer dereference in the AnnotRichMedia::Configuration::Configuration","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14928.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14928.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14928","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38322","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38691","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52486","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52531","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52395","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52433","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14928"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=102607","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=102607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14928"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500322","reference_id":"1500322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500322"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877231","reference_id":"877231","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877231"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14928","reference_id":"CVE-2017-14928","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14928"},{"reference_url":"https://usn.ubuntu.com/3440-1/","reference_id":"USN-3440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3440-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-14928"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pc5k-98kh-suce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50210?format=json","vulnerability_id":"VCID-qayv-8u9a-83h4","summary":"KPdf includes vulnerable Xpdf code to handle PDF files, making it\n    vulnerable to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0301","reference_id":"","reference_type":"","scores":[{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86717","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86764","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86773","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86786","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86783","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86794","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86811","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03084","scoring_system":"epss","scoring_elements":"0.86818","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617882","reference_id":"1617882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617882"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783","reference_id":"350783","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350783"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350785","reference_id":"350785","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350785"},{"reference_url":"https://security.gentoo.org/glsa/200602-04","reference_id":"GLSA-200602-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200602-04"},{"reference_url":"https://security.gentoo.org/glsa/200602-05","reference_id":"GLSA-200602-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200602-05"},{"reference_url":"https://security.gentoo.org/glsa/200602-12","reference_id":"GLSA-200602-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200602-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0201","reference_id":"RHSA-2006:0201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0206","reference_id":"RHSA-2006:0206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0206"},{"reference_url":"https://usn.ubuntu.com/249-1/","reference_id":"USN-249-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/249-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935584?format=json","purl":"pkg:deb/debian/poppler@0.4.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2006-0301"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qayv-8u9a-83h4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41481?format=json","vulnerability_id":"VCID-qdcv-xd8k-8qbu","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19149.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19149.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19149","reference_id":"","reference_type":"","scores":[{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49446","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49453","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49508","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49504","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49493","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49542","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.4954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49511","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49467","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19149"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649457","reference_id":"1649457","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649457"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914600","reference_id":"914600","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914600"},{"reference_url":"https://security.gentoo.org/glsa/201904-04","reference_id":"GLSA-201904-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://usn.ubuntu.com/3837-1/","reference_id":"USN-3837-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3837-1/"},{"reference_url":"https://usn.ubuntu.com/3837-2/","reference_id":"USN-3837-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3837-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935607?format=json","purl":"pkg:deb/debian/poppler@0.71.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-19149"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdcv-xd8k-8qbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83892?format=json","vulnerability_id":"VCID-qjj9-dejh-vuaq","summary":"poppler: Infinite recursion in fofi/FoFiType1C.cc:FoFiType1C::cvtGlyph() function allows denial of service","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3505","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18267.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18267.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18267","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50793","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50848","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50929","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50891","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50935","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18267"},{"reference_url":"https://bugzilla.freedesktop.org/show_bug.cgi?id=103238","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.freedesktop.org/show_bug.cgi?id=103238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1578777","reference_id":"1578777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1578777"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898357","reference_id":"898357","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898357"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18267","reference_id":"CVE-2017-18267","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3647-1/","reference_id":"USN-3647-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3647-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935602?format=json","purl":"pkg:deb/debian/poppler@0.69.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.69.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-18267"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qjj9-dejh-vuaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32136?format=json","vulnerability_id":"VCID-qmt5-gtpg-vbg2","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183107.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183107.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183142.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183142.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00068.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00068.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00077.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00077.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2580.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2580.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8868.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8868","reference_id":"","reference_type":"","scores":[{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77848","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77897","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77945","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77944","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77938","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8868"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=93476","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=93476"},{"reference_url":"https://cgit.freedesktop.org/poppler/poppler/commit/?id=b3425dd3261679958cd56c0f71995c15d2124433","reference_id":"","reference_type":"","scores":[],"url":"https://cgit.freedesktop.org/poppler/poppler/commit/?id=b3425dd3261679958cd56c0f71995c15d2124433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://poppler.freedesktop.org/releases.html","reference_id":"","reference_type":"","scores":[],"url":"https://poppler.freedesktop.org/releases.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3563","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3563"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/04/12/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/04/12/1"},{"reference_url":"http://www.securityfocus.com/bid/89324","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89324"},{"reference_url":"http://www.ubuntu.com/usn/USN-2958-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2958-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1326225","reference_id":"1326225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1326225"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822578","reference_id":"822578","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822578"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8868","reference_id":"CVE-2015-8868","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8868"},{"reference_url":"https://security.gentoo.org/glsa/201611-15","reference_id":"GLSA-201611-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2580","reference_id":"RHSA-2016:2580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2580"},{"reference_url":"https://usn.ubuntu.com/2958-1/","reference_id":"USN-2958-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2958-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935600?format=json","purl":"pkg:deb/debian/poppler@0.38.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.38.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2015-8868"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmt5-gtpg-vbg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82803?format=json","vulnerability_id":"VCID-qpwe-7kfy-pyb8","summary":"poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7310.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7310.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7310","reference_id":"","reference_type":"","scores":[{"value":"0.003","scoring_system":"epss","scoring_elements":"0.5322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53344","published_at":"2026-04-18T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53289","published_at":"2026-04-08T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53318","published_at":"2026-04-12T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53339","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7310"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12797","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7310"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/717","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/717"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BI7NLDN2HUEU4ZW3D7XPHOAEGT2CKDRO/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BI7NLDN2HUEU4ZW3D7XPHOAEGT2CKDRO/"},{"reference_url":"http://www.securityfocus.com/bid/106829","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672419","reference_id":"1672419","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672419"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921215","reference_id":"921215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921215"},{"reference_url":"https://security.archlinux.org/AVG-869","reference_id":"AVG-869","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-869"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.73.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.73.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.73.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7310","reference_id":"CVE-2019-7310","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/3886-1/","reference_id":"USN-3886-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3886-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935605?format=json","purl":"pkg:deb/debian/poppler@0.71.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-7310"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qpwe-7kfy-pyb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69085?format=json","vulnerability_id":"VCID-qsy6-em2u-cyd2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15565.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15565.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15565","reference_id":"","reference_type":"","scores":[{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69878","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.70034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.70026","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.6989","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.6993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.6997","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69954","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.6994","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69984","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00617","scoring_system":"epss","scoring_elements":"0.69994","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15565"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=103016","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=103016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4079","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510977","reference_id":"1510977","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510977"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879066","reference_id":"879066","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879066"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15565","reference_id":"CVE-2017-15565","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15565"},{"reference_url":"https://usn.ubuntu.com/3467-1/","reference_id":"USN-3467-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3467-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935601?format=json","purl":"pkg:deb/debian/poppler@0.61.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.61.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-15565"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qsy6-em2u-cyd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49250?format=json","vulnerability_id":"VCID-qtb6-gvjp-cqbq","summary":"Multiple vulnerabilities have been discovered in Poppler, the worst of which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27337.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27337.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27337","reference_id":"","reference_type":"","scores":[{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46744","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46782","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46742","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46797","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46798","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46854","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46851","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38784","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38784"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010695","reference_id":"1010695","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010695"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2087190","reference_id":"2087190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2087190"},{"reference_url":"https://security.archlinux.org/AVG-2812","reference_id":"AVG-2812","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2812"},{"reference_url":"https://security.gentoo.org/glsa/202509-01","reference_id":"GLSA-202509-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7594","reference_id":"RHSA-2022:7594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8151","reference_id":"RHSA-2022:8151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8151"},{"reference_url":"https://usn.ubuntu.com/6273-1/","reference_id":"USN-6273-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6273-1/"},{"reference_url":"https://usn.ubuntu.com/7687-1/","reference_id":"USN-7687-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7687-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935612?format=json","purl":"pkg:deb/debian/poppler@22.08.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.08.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2022-27337"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtb6-gvjp-cqbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31229?format=json","vulnerability_id":"VCID-rm6a-c4rf-f7hc","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0800","reference_id":"","reference_type":"","scores":[{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92605","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.9261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08985","scoring_system":"epss","scoring_elements":"0.92628","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495887","reference_id":"495887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495887"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-0800"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82677?format=json","vulnerability_id":"VCID-s3q2-uvnc-wfep","summary":"poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10871.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10871","reference_id":"","reference_type":"","scores":[{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70182","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.7033","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70338","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70244","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70295","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/751","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/751"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00025.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/"},{"reference_url":"http://www.securityfocus.com/bid/107862","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107862"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1696636","reference_id":"1696636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1696636"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926529","reference_id":"926529","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926529"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10871","reference_id":"CVE-2019-10871","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1074","reference_id":"RHSA-2020:1074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1074"},{"reference_url":"https://usn.ubuntu.com/4646-1/","reference_id":"USN-4646-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4646-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-10871"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s3q2-uvnc-wfep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36521?format=json","vulnerability_id":"VCID-s66u-r7vs-bfdu","summary":"Multiple vulnerabilities have been discovered in T1Lib, the worst\n    of which could lead to remote execution of arbitrary code.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1553.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1553","reference_id":"","reference_type":"","scores":[{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89616","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89632","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.8965","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89661","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89669","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.8967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89679","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04953","scoring_system":"epss","scoring_elements":"0.89682","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553"},{"reference_url":"http://secunia.com/advisories/43823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43823"},{"reference_url":"http://secunia.com/advisories/48985","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48985"},{"reference_url":"http://securityreason.com/securityalert/8171","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8171"},{"reference_url":"http://securitytracker.com/id?1025266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025266"},{"reference_url":"http://www.foolabs.com/xpdf/download.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.foolabs.com/xpdf/download.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/376500","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/376500"},{"reference_url":"http://www.kb.cert.org/vuls/id/MAPG-8ECL8X","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MAPG-8ECL8X"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"},{"reference_url":"http://www.securityfocus.com/archive/1/517205/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517205/100/0/threaded"},{"reference_url":"http://www.toucan-system.com/advisories/tssa-2011-01.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.toucan-system.com/advisories/tssa-2011-01.txt"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0728","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0728"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=692854","reference_id":"692854","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=692854"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1553","reference_id":"CVE-2011-1553","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1553"},{"reference_url":"https://security.gentoo.org/glsa/201701-57","reference_id":"GLSA-201701-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0062","reference_id":"RHSA-2012:0062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0137","reference_id":"RHSA-2012:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1201","reference_id":"RHSA-2012:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1201"},{"reference_url":"https://usn.ubuntu.com/1335-1/","reference_id":"USN-1335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2011-1553"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s66u-r7vs-bfdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61424?format=json","vulnerability_id":"VCID-sv3r-4tym-qua5","summary":"Poppler and various KDE components are vulnerable to multiple memory\n    management issues possibly resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5393","reference_id":"","reference_type":"","scores":[{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94355","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94375","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94389","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94393","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94394","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14245","scoring_system":"epss","scoring_elements":"0.94416","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=345121","reference_id":"345121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=345121"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628","reference_id":"450628","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629","reference_id":"450629","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629"},{"reference_url":"https://security.gentoo.org/glsa/200711-22","reference_id":"GLSA-200711-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1021","reference_id":"RHSA-2007:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1022","reference_id":"RHSA-2007:1022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1023","reference_id":"RHSA-2007:1023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1024","reference_id":"RHSA-2007:1024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1025","reference_id":"RHSA-2007:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1026","reference_id":"RHSA-2007:1026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1027","reference_id":"RHSA-2007:1027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1028","reference_id":"RHSA-2007:1028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1029","reference_id":"RHSA-2007:1029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1030","reference_id":"RHSA-2007:1030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1031","reference_id":"RHSA-2007:1031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1051","reference_id":"RHSA-2007:1051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1051"},{"reference_url":"https://usn.ubuntu.com/542-1/","reference_id":"USN-542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/542-1/"},{"reference_url":"https://usn.ubuntu.com/542-2/","reference_id":"USN-542-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/542-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935587?format=json","purl":"pkg:deb/debian/poppler@0.6.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.6.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2007-5393"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sv3r-4tym-qua5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80683?format=json","vulnerability_id":"VCID-tabs-mq7h-7bh5","summary":"poppler: heap-based buffer overflow via a crafted PDF document","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35702.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35702.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35702","reference_id":"","reference_type":"","scores":[{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63017","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63156","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63141","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63176","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35702"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1912912","reference_id":"1912912","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1912912"},{"reference_url":"https://security.archlinux.org/ASA-202101-3","reference_id":"ASA-202101-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202101-3"},{"reference_url":"https://security.archlinux.org/AVG-1382","reference_id":"AVG-1382","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1382"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2020-35702"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tabs-mq7h-7bh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72599?format=json","vulnerability_id":"VCID-tfe8-bq62-3ke4","summary":"Poppler: out-of-bounds read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56378.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56378.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56378","reference_id":"","reference_type":"","scores":[{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53709","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53757","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53783","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53731","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53725","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53774","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56378"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091322","reference_id":"1091322","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091322"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1553","reference_id":"1553","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-26T19:27:24Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333794","reference_id":"2333794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333794"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/ade9b5ebed44b0c15522c27669ef6cdf93eff84e","reference_id":"ade9b5ebed44b0c15522c27669ef6cdf93eff84e","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-26T19:27:24Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/ade9b5ebed44b0c15522c27669ef6cdf93eff84e"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/blob/30eada0d2bceb42c2d2a87361339063e0b9bea50/CMakeLists.txt#L621","reference_id":"CMakeLists.txt#L621","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-26T19:27:24Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/blob/30eada0d2bceb42c2d2a87361339063e0b9bea50/CMakeLists.txt#L621"},{"reference_url":"https://usn.ubuntu.com/7213-1/","reference_id":"USN-7213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935613?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935617?format=json","purl":"pkg:deb/debian/poppler@24.08.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@24.08.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2024-56378"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tfe8-bq62-3ke4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83023?format=json","vulnerability_id":"VCID-tt3h-qbbv-zuev","summary":"poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18897.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18897","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3562","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35301","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41629","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41626","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41653","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4163","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646546","reference_id":"1646546","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646546"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913164","reference_id":"913164","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-18897"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tt3h-qbbv-zuev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82764?format=json","vulnerability_id":"VCID-tu6x-7fgv-1ffu","summary":"poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9200.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9200.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9200","reference_id":"","reference_type":"","scores":[{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.89978","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90037","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90035","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90053","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.8998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.89993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.89998","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90029","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90027","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05298","scoring_system":"epss","scoring_elements":"0.90021","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9200"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/728","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/728"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWP5XSUG6GNRI75NYKF53KIB2CZY6QQ6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWP5XSUG6GNRI75NYKF53KIB2CZY6QQ6/"},{"reference_url":"https://research.loginsoft.com/bugs/heap-based-buffer-underwrite-in-imagestreamgetline-poppler-0-74-0/","reference_id":"","reference_type":"","scores":[],"url":"https://research.loginsoft.com/bugs/heap-based-buffer-underwrite-in-imagestreamgetline-poppler-0-74-0/"},{"reference_url":"http://www.securityfocus.com/bid/107172","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1683632","reference_id":"1683632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1683632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923414","reference_id":"923414","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923414"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9200","reference_id":"CVE-2019-9200","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2713","reference_id":"RHSA-2019:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2713"},{"reference_url":"https://usn.ubuntu.com/3905-1/","reference_id":"USN-3905-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3905-1/"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935605?format=json","purl":"pkg:deb/debian/poppler@0.71.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-9200"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tu6x-7fgv-1ffu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82681?format=json","vulnerability_id":"VCID-tzdq-9gfz-yud5","summary":"poppler: null-pointer dereference in function SplashClip::clipAALine in splash/SplashClip.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10873.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10873","reference_id":"","reference_type":"","scores":[{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75759","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75676","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.7571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75758","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.7577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75773","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10873"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/issues/748","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.freedesktop.org/poppler/poppler/issues/748"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/"},{"reference_url":"http://www.securityfocus.com/bid/107862","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107862"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1696637","reference_id":"1696637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1696637"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926532","reference_id":"926532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926532"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10873","reference_id":"CVE-2019-10873","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10873"},{"reference_url":"https://usn.ubuntu.com/4042-1/","reference_id":"USN-4042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4042-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935605?format=json","purl":"pkg:deb/debian/poppler@0.71.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2019-10873"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tzdq-9gfz-yud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31236?format=json","vulnerability_id":"VCID-uczb-yext-6yfq","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1188","reference_id":"","reference_type":"","scores":[{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95736","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95764","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95789","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21975","scoring_system":"epss","scoring_elements":"0.95788","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495907","reference_id":"495907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495907"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779","reference_id":"575779","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1503","reference_id":"RHSA-2009:1503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1512","reference_id":"RHSA-2009:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1512"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-1188"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uczb-yext-6yfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31232?format=json","vulnerability_id":"VCID-uny2-k19n-1bb2","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1181","reference_id":"","reference_type":"","scores":[{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85086","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85119","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85157","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02433","scoring_system":"epss","scoring_elements":"0.85207","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495894","reference_id":"495894","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495894"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-1181"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36519?format=json","vulnerability_id":"VCID-upkc-66fh-wbby","summary":"Multiple vulnerabilities have been discovered in T1Lib, the worst\n    of which could lead to remote execution of arbitrary code.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0764.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0764.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0764","reference_id":"","reference_type":"","scores":[{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96777","published_at":"2026-04-29T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.9673","published_at":"2026-04-01T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.9674","published_at":"2026-04-02T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96754","published_at":"2026-04-09T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96757","published_at":"2026-04-12T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.9677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96772","published_at":"2026-04-24T12:55:00Z"},{"value":"0.31187","scoring_system":"epss","scoring_elements":"0.96774","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764"},{"reference_url":"http://secunia.com/advisories/43823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43823"},{"reference_url":"http://secunia.com/advisories/47347","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/47347"},{"reference_url":"http://secunia.com/advisories/48985","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48985"},{"reference_url":"http://securityreason.com/securityalert/8171","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8171"},{"reference_url":"http://securitytracker.com/id?1025266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025266"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66208","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66208"},{"reference_url":"http://www.foolabs.com/xpdf/download.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.foolabs.com/xpdf/download.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/376500","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/376500"},{"reference_url":"http://www.kb.cert.org/vuls/id/MAPG-8ECL8X","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MAPG-8ECL8X"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:002","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:002"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"},{"reference_url":"http://www.securityfocus.com/archive/1/517205/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517205/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/46941","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46941"},{"reference_url":"http://www.toucan-system.com/advisories/tssa-2011-01.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.toucan-system.com/advisories/tssa-2011-01.txt"},{"reference_url":"http://www.ubuntu.com/usn/USN-1316-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1316-1"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0728","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0728"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=692909","reference_id":"692909","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=692909"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0764","reference_id":"CVE-2011-0764","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0764"},{"reference_url":"https://security.gentoo.org/glsa/201701-57","reference_id":"GLSA-201701-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0062","reference_id":"RHSA-2012:0062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0137","reference_id":"RHSA-2012:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1201","reference_id":"RHSA-2012:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1201"},{"reference_url":"https://usn.ubuntu.com/1316-1/","reference_id":"USN-1316-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1316-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2011-0764"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upkc-66fh-wbby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49938?format=json","vulnerability_id":"VCID-utex-65f9-53cq","summary":"KPdf and KWord both include vulnerable Xpdf code to handle PDF files,\n    making them vulnerable to the execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2006-0177.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3625","reference_id":"","reference_type":"","scores":[{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93556","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.9349","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93518","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93523","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93522","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93542","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93555","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.9356","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11286","scoring_system":"epss","scoring_elements":"0.93558","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3625"},{"reference_url":"http://scary.beasts.org/security/CESA-2005-003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2005-003.txt"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625"},{"reference_url":"http://secunia.com/advisories/18147","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18147"},{"reference_url":"http://secunia.com/advisories/18303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18303"},{"reference_url":"http://secunia.com/advisories/18312","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18312"},{"reference_url":"http://secunia.com/advisories/18313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18313"},{"reference_url":"http://secunia.com/advisories/18329","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18329"},{"reference_url":"http://secunia.com/advisories/18332","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18332"},{"reference_url":"http://secunia.com/advisories/18334","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18334"},{"reference_url":"http://secunia.com/advisories/18335","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18335"},{"reference_url":"http://secunia.com/advisories/18338","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18338"},{"reference_url":"http://secunia.com/advisories/18349","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18349"},{"reference_url":"http://secunia.com/advisories/18373","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18373"},{"reference_url":"http://secunia.com/advisories/18375","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18375"},{"reference_url":"http://secunia.com/advisories/18380","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18380"},{"reference_url":"http://secunia.com/advisories/18385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18385"},{"reference_url":"http://secunia.com/advisories/18387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18387"},{"reference_url":"http://secunia.com/advisories/18389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18389"},{"reference_url":"http://secunia.com/advisories/18398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18398"},{"reference_url":"http://secunia.com/advisories/18407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18407"},{"reference_url":"http://secunia.com/advisories/18414","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18414"},{"reference_url":"http://secunia.com/advisories/18416","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18416"},{"reference_url":"http://secunia.com/advisories/18423","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18423"},{"reference_url":"http://secunia.com/advisories/18425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18425"},{"reference_url":"http://secunia.com/advisories/18428","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18428"},{"reference_url":"http://secunia.com/advisories/18436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18436"},{"reference_url":"http://secunia.com/advisories/18448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18448"},{"reference_url":"http://secunia.com/advisories/18463","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18463"},{"reference_url":"http://secunia.com/advisories/18517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18517"},{"reference_url":"http://secunia.com/advisories/18534","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18534"},{"reference_url":"http://secunia.com/advisories/18554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18554"},{"reference_url":"http://secunia.com/advisories/18582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18582"},{"reference_url":"http://secunia.com/advisories/18642","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18642"},{"reference_url":"http://secunia.com/advisories/18644","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18644"},{"reference_url":"http://secunia.com/advisories/18674","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18674"},{"reference_url":"http://secunia.com/advisories/18675","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18675"},{"reference_url":"http://secunia.com/advisories/18679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18679"},{"reference_url":"http://secunia.com/advisories/18908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18908"},{"reference_url":"http://secunia.com/advisories/18913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18913"},{"reference_url":"http://secunia.com/advisories/19230","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19230"},{"reference_url":"http://secunia.com/advisories/19377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19377"},{"reference_url":"http://secunia.com/advisories/25729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25729"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24023","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24023"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-931","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-931"},{"reference_url":"http://www.debian.org/security/2005/dsa-932","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-932"},{"reference_url":"http://www.debian.org/security/2005/dsa-937","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-937"},{"reference_url":"http://www.debian.org/security/2005/dsa-938","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-938"},{"reference_url":"http://www.debian.org/security/2005/dsa-940","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-940"},{"reference_url":"http://www.debian.org/security/2006/dsa-936","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-936"},{"reference_url":"http://www.debian.org/security/2006/dsa-950","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-950"},{"reference_url":"http://www.debian.org/security/2006/dsa-961","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-961"},{"reference_url":"http://www.debian.org/security/2006/dsa-962","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-962"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0163.html"},{"reference_url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/16143","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/16143"},{"reference_url":"http://www.trustix.org/errata/2006/0002/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2006/0002/"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0047","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0047"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617827","reference_id":"1617827","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617827"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076","reference_id":"346076","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346076"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3625","reference_id":"CVE-2005-3625","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3625"},{"reference_url":"https://security.gentoo.org/glsa/200601-02","reference_id":"GLSA-200601-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200601-02"},{"reference_url":"https://security.gentoo.org/glsa/200601-17","reference_id":"GLSA-200601-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200601-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:840","reference_id":"RHSA-2005:840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:868","reference_id":"RHSA-2005:868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0160","reference_id":"RHSA-2006:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0163","reference_id":"RHSA-2006:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0177","reference_id":"RHSA-2006:0177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0177"},{"reference_url":"https://usn.ubuntu.com/236-1/","reference_id":"USN-236-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/236-1/"},{"reference_url":"https://usn.ubuntu.com/236-2/","reference_id":"USN-236-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/236-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935583?format=json","purl":"pkg:deb/debian/poppler@0.4.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2005-3625"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-utex-65f9-53cq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88241?format=json","vulnerability_id":"VCID-v15u-sguq-skg9","summary":"poppler/evince: DoS via crafted PDF file","references":[{"reference_url":"http://bugs.freedesktop.org/show_bug.cgi?id=19702","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.freedesktop.org/show_bug.cgi?id=19702"},{"reference_url":"http://lists.freedesktop.org/archives/poppler/2009-January/004403.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/poppler/2009-January/004403.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0756.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0756","reference_id":"","reference_type":"","scores":[{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94311","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94313","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13982","scoring_system":"epss","scoring_elements":"0.94331","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14855","scoring_system":"epss","scoring_elements":"0.94543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14855","scoring_system":"epss","scoring_elements":"0.94544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14855","scoring_system":"epss","scoring_elements":"0.94542","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756"},{"reference_url":"http://secunia.com/advisories/33853","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33853"},{"reference_url":"http://secunia.com/advisories/35685","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35685"},{"reference_url":"http://wiki.rpath.com/Advisories:rPSA-2009-0059","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/Advisories:rPSA-2009-0059"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/02/13/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2009/02/13/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/02/19/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2009/02/19/2"},{"reference_url":"http://www.securityfocus.com/archive/1/502761/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/502761/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/33749","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33749"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=488339","reference_id":"488339","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=488339"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518478","reference_id":"518478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518478"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0756","reference_id":"CVE-2009-0756","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0756"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-0756"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v15u-sguq-skg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78234?format=json","vulnerability_id":"VCID-vr4e-q9gp-qbem","summary":"poppler: Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34872.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34872","reference_id":"","reference_type":"","scores":[{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37248","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37655","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37674","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37593","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37356","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37336","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34872"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042811","reference_id":"1042811","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042811"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399","reference_id":"1399","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:46:31Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2227884","reference_id":"2227884","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2227884"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XXL3L6RJOTLGCN7GLH2OLLNF4FJ4T7I/","reference_id":"3XXL3L6RJOTLGCN7GLH2OLLNF4FJ4T7I","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:46:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XXL3L6RJOTLGCN7GLH2OLLNF4FJ4T7I/"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe","reference_id":"591235c8b6c65a2eee88991b9ae73490fd9afdfe","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:46:31Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ3NYJ43U2MA7COKGMJDARZUAAOP45D4/","reference_id":"JQ3NYJ43U2MA7COKGMJDARZUAAOP45D4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:46:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ3NYJ43U2MA7COKGMJDARZUAAOP45D4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFBT75QHBWNMSDAHSXZQ2I3PBJWID36K/","reference_id":"SFBT75QHBWNMSDAHSXZQ2I3PBJWID36K","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:46:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFBT75QHBWNMSDAHSXZQ2I3PBJWID36K/"},{"reference_url":"https://usn.ubuntu.com/6273-1/","reference_id":"USN-6273-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6273-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3H3GOWFE3C7543GMEN7LY4GWMWJ7D2G/","reference_id":"W3H3GOWFE3C7543GMEN7LY4GWMWJ7D2G","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:46:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3H3GOWFE3C7543GMEN7LY4GWMWJ7D2G/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935616?format=json","purl":"pkg:deb/debian/poppler@24.02.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@24.02.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2023-34872"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vr4e-q9gp-qbem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31234?format=json","vulnerability_id":"VCID-vudr-8rrg-hufx","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1183","reference_id":"","reference_type":"","scores":[{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82232","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82285","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82312","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82335","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01703","scoring_system":"epss","scoring_elements":"0.82373","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=495899","reference_id":"495899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=495899"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-1183"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83019?format=json","vulnerability_id":"VCID-wbyn-9mx6-a3gd","summary":"poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19059.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19059.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19059","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3222","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32392","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32217","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32266","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32258","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32261","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32241","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32212","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31842","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649440","reference_id":"1649440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649440"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913180","reference_id":"913180","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://usn.ubuntu.com/3837-1/","reference_id":"USN-3837-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3837-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-19059"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wbyn-9mx6-a3gd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61423?format=json","vulnerability_id":"VCID-wpgs-8fw5-wbhe","summary":"Poppler and various KDE components are vulnerable to multiple memory\n    management issues possibly resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5392","reference_id":"","reference_type":"","scores":[{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91135","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91168","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.91183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06567","scoring_system":"epss","scoring_elements":"0.9118","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=345111","reference_id":"345111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=345111"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628","reference_id":"450628","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450628"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629","reference_id":"450629","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450629"},{"reference_url":"https://security.gentoo.org/glsa/200711-22","reference_id":"GLSA-200711-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1021","reference_id":"RHSA-2007:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1022","reference_id":"RHSA-2007:1022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1024","reference_id":"RHSA-2007:1024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1025","reference_id":"RHSA-2007:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1026","reference_id":"RHSA-2007:1026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1027","reference_id":"RHSA-2007:1027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1029","reference_id":"RHSA-2007:1029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1030","reference_id":"RHSA-2007:1030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1030"},{"reference_url":"https://usn.ubuntu.com/542-1/","reference_id":"USN-542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/542-1/"},{"reference_url":"https://usn.ubuntu.com/542-2/","reference_id":"USN-542-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/542-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935587?format=json","purl":"pkg:deb/debian/poppler@0.6.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.6.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2007-5392"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpgs-8fw5-wbhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31242?format=json","vulnerability_id":"VCID-xddx-numk-a7bn","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3608","reference_id":"","reference_type":"","scores":[{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93944","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93973","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.9398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.93995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94001","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94003","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12664","scoring_system":"epss","scoring_elements":"0.94002","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526637","reference_id":"526637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526637"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1503","reference_id":"RHSA-2009:1503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1504","reference_id":"RHSA-2009:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1512","reference_id":"RHSA-2009:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1513","reference_id":"RHSA-2009:1513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935591?format=json","purl":"pkg:deb/debian/poppler@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-3608"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xddx-numk-a7bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34310?format=json","vulnerability_id":"VCID-xqh5-sxfb-gueh","summary":"Multiple vulnerabilities have been discovered in Xpdf, GPdf, CUPS and\n    Poppler potentially resulting in the execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.01pl1.patch"},{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"},{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"},{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289"},{"reference_url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2005-868.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2005-868.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3192","reference_id":"","reference_type":"","scores":[{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93889","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.9382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.9388","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93886","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12279","scoring_system":"epss","scoring_elements":"0.93887","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3192"},{"reference_url":"http://scary.beasts.org/security/CESA-2005-003.txt","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2005-003.txt"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192"},{"reference_url":"http://secunia.com/advisories/17897/","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17897/"},{"reference_url":"http://secunia.com/advisories/17908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17908"},{"reference_url":"http://secunia.com/advisories/17912","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17912"},{"reference_url":"http://secunia.com/advisories/17916","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17916"},{"reference_url":"http://secunia.com/advisories/17920","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17920"},{"reference_url":"http://secunia.com/advisories/17921","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17921"},{"reference_url":"http://secunia.com/advisories/17926","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17926"},{"reference_url":"http://secunia.com/advisories/17929","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17929"},{"reference_url":"http://secunia.com/advisories/17940","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17940"},{"reference_url":"http://secunia.com/advisories/17955","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17955"},{"reference_url":"http://secunia.com/advisories/17976","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17976"},{"reference_url":"http://secunia.com/advisories/18009","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18009"},{"reference_url":"http://secunia.com/advisories/18055","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18055"},{"reference_url":"http://secunia.com/advisories/18061","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18061"},{"reference_url":"http://secunia.com/advisories/18189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18189"},{"reference_url":"http://secunia.com/advisories/18191","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18191"},{"reference_url":"http://secunia.com/advisories/18192","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18192"},{"reference_url":"http://secunia.com/advisories/18303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18303"},{"reference_url":"http://secunia.com/advisories/18313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18313"},{"reference_url":"http://secunia.com/advisories/18336","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18336"},{"reference_url":"http://secunia.com/advisories/18349","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18349"},{"reference_url":"http://secunia.com/advisories/18380","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18380"},{"reference_url":"http://secunia.com/advisories/18385","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18385"},{"reference_url":"http://secunia.com/advisories/18387","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18387"},{"reference_url":"http://secunia.com/advisories/18389","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18389"},{"reference_url":"http://secunia.com/advisories/18398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18398"},{"reference_url":"http://secunia.com/advisories/18407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18407"},{"reference_url":"http://secunia.com/advisories/18416","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18416"},{"reference_url":"http://secunia.com/advisories/18428","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18428"},{"reference_url":"http://secunia.com/advisories/18436","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18436"},{"reference_url":"http://secunia.com/advisories/18448","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18448"},{"reference_url":"http://secunia.com/advisories/18503","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18503"},{"reference_url":"http://secunia.com/advisories/18517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18517"},{"reference_url":"http://secunia.com/advisories/18534","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18534"},{"reference_url":"http://secunia.com/advisories/18549","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18549"},{"reference_url":"http://secunia.com/advisories/18554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18554"},{"reference_url":"http://secunia.com/advisories/18582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18582"},{"reference_url":"http://secunia.com/advisories/18674","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18674"},{"reference_url":"http://secunia.com/advisories/18675","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18675"},{"reference_url":"http://secunia.com/advisories/18679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18679"},{"reference_url":"http://secunia.com/advisories/18908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18908"},{"reference_url":"http://secunia.com/advisories/18913","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18913"},{"reference_url":"http://secunia.com/advisories/19230","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19230"},{"reference_url":"http://secunia.com/advisories/19377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19377"},{"reference_url":"http://secunia.com/advisories/19797","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19797"},{"reference_url":"http://secunia.com/advisories/19798","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19798"},{"reference_url":"http://secunia.com/advisories/25729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25729"},{"reference_url":"http://secunia.com/advisories/26413","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26413"},{"reference_url":"http://securityreason.com/securityalert/235","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/235"},{"reference_url":"http://securityreason.com/securityalert/240","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/240"},{"reference_url":"http://securitytracker.com/id?1015309","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015309"},{"reference_url":"http://securitytracker.com/id?1015324","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015324"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23442","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23442"},{"reference_url":"https://issues.rpath.com/browse/RPL-1609","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1609"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-931","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-931"},{"reference_url":"http://www.debian.org/security/2005/dsa-932","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-932"},{"reference_url":"http://www.debian.org/security/2006/dsa-936","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-936"},{"reference_url":"http://www.debian.org/security/2006/dsa-937","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-937"},{"reference_url":"http://www.debian.org/security/2006/dsa-950","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-950"},{"reference_url":"http://www.debian.org/security/2006/dsa-961","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-961"},{"reference_url":"http://www.debian.org/security/2006/dsa-962","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-962"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-1.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-1.txt"},{"reference_url":"http://www.kde.org/info/security/advisory-20051207-2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20051207-2.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2006_02_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2006_02_sr.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-840.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-840.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-867.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-867.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-878.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-878.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0160.html"},{"reference_url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/418883/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427053/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/427990/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15725","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15725"},{"reference_url":"http://www.trustix.org/errata/2005/0072/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0072/"},{"reference_url":"http://www.ubuntulinux.org/usn/usn-227-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntulinux.org/usn/usn-227-1"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2755","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2755"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2786","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2786"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2787","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2787"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2788","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2788"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2789","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2789"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2790","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2790"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2856","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2856"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617797","reference_id":"1617797","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617797"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281","reference_id":"342281","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342281"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288","reference_id":"342288","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342288"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3192","reference_id":"CVE-2005-3192","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3192"},{"reference_url":"https://security.gentoo.org/glsa/200512-08","reference_id":"GLSA-200512-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200512-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:840","reference_id":"RHSA-2005:840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:867","reference_id":"RHSA-2005:867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:868","reference_id":"RHSA-2005:868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:878","reference_id":"RHSA-2005:878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0160","reference_id":"RHSA-2006:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0160"},{"reference_url":"https://usn.ubuntu.com/227-1/","reference_id":"USN-227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935582?format=json","purl":"pkg:deb/debian/poppler@0.4.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.4.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2005-3192"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqh5-sxfb-gueh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49251?format=json","vulnerability_id":"VCID-ygrf-gq35-fkfd","summary":"Multiple vulnerabilities have been discovered in Poppler, the worst of which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52886.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52886.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-52886","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25579","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26973","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26889","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26937","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51187","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-52886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/04bd91684ed41d67ae0f10cde0660e4ed74ac203","reference_id":"04bd91684ed41d67ae0f10cde0660e4ed74ac203","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:59:12Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/04bd91684ed41d67ae0f10cde0660e4ed74ac203"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108784","reference_id":"1108784","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108784"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1581","reference_id":"1581","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:59:12Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/issues/1581"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1828","reference_id":"1828","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:59:12Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1828"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2375930","reference_id":"2375930","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2375930"},{"reference_url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/ac36affcc8486de38e8905a8d6547a3464ff46e5","reference_id":"ac36affcc8486de38e8905a8d6547a3464ff46e5","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:59:12Z/"}],"url":"https://gitlab.freedesktop.org/poppler/poppler/-/commit/ac36affcc8486de38e8905a8d6547a3464ff46e5"},{"reference_url":"https://securitylab.github.com/advisories/GHSL-2025-054_poppler/","reference_id":"GHSL-2025-054_poppler","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:59:12Z/"}],"url":"https://securitylab.github.com/advisories/GHSL-2025-054_poppler/"},{"reference_url":"https://security.gentoo.org/glsa/202509-01","reference_id":"GLSA-202509-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-01"},{"reference_url":"https://usn.ubuntu.com/7675-1/","reference_id":"USN-7675-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7675-1/"},{"reference_url":"https://usn.ubuntu.com/7687-1/","reference_id":"USN-7687-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7687-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935623?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2025-52886"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ygrf-gq35-fkfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31221?format=json","vulnerability_id":"VCID-ynvq-nzrq-9bca","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0146","reference_id":"","reference_type":"","scores":[{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82514","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612","reference_id":"490612","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935590?format=json","purl":"pkg:deb/debian/poppler@0.10.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-0146"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31243?format=json","vulnerability_id":"VCID-yu46-ypr2-dfce","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3609","reference_id":"","reference_type":"","scores":[{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.9065","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.9066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90669","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90685","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.9069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90709","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90704","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.9072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90721","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05999","scoring_system":"epss","scoring_elements":"0.90717","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526893","reference_id":"526893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526893"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1500","reference_id":"RHSA-2009:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1503","reference_id":"RHSA-2009:1503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1504","reference_id":"RHSA-2009:1504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1512","reference_id":"RHSA-2009:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1513","reference_id":"RHSA-2009:1513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0401","reference_id":"RHSA-2010:0401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0755","reference_id":"RHSA-2010:0755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0755"},{"reference_url":"https://usn.ubuntu.com/850-1/","reference_id":"USN-850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-1/"},{"reference_url":"https://usn.ubuntu.com/850-3/","reference_id":"USN-850-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/850-3/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935591?format=json","purl":"pkg:deb/debian/poppler@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-3609"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yu46-ypr2-dfce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75376?format=json","vulnerability_id":"VCID-yyxy-juya-a3f1","summary":"poppler: pdfinfo: crash in broken documents when using -dests parameter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6239.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6239","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32049","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32051","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32102","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32131","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32135","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32076","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6239"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074146","reference_id":"1074146","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293594","reference_id":"2293594","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:14:35Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293594"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-6239","reference_id":"CVE-2024-6239","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:14:35Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-6239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5305","reference_id":"RHSA-2024:5305","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:14:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:5305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9167","reference_id":"RHSA-2024:9167","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:14:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9167"},{"reference_url":"https://usn.ubuntu.com/6915-1/","reference_id":"USN-6915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6915-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935618?format=json","purl":"pkg:deb/debian/poppler@24.08.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@24.08.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2024-6239"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yyxy-juya-a3f1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83187?format=json","vulnerability_id":"VCID-yyzk-7mqj-m7hq","summary":"poppler: infinite recursion in Parser::getObj function in Parser.cc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16646.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16646","reference_id":"","reference_type":"","scores":[{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71552","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71559","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71577","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.7155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.7159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.716","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83862","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83895","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83921","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83929","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626618","reference_id":"1626618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626618"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909802","reference_id":"909802","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://usn.ubuntu.com/3837-1/","reference_id":"USN-3837-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3837-1/"},{"reference_url":"https://usn.ubuntu.com/3837-2/","reference_id":"USN-3837-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3837-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935605?format=json","purl":"pkg:deb/debian/poppler@0.71.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.71.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-16646"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yyzk-7mqj-m7hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36520?format=json","vulnerability_id":"VCID-z77s-ej5r-rbcd","summary":"Multiple vulnerabilities have been discovered in T1Lib, the worst\n    of which could lead to remote execution of arbitrary code.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1201.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1552.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1552","reference_id":"","reference_type":"","scores":[{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95786","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95834","published_at":"2026-04-16T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95839","published_at":"2026-04-18T12:55:00Z"},{"value":"0.22374","scoring_system":"epss","scoring_elements":"0.95842","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552"},{"reference_url":"http://secunia.com/advisories/43823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43823"},{"reference_url":"http://secunia.com/advisories/48985","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48985"},{"reference_url":"http://securityreason.com/securityalert/8171","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8171"},{"reference_url":"http://securitytracker.com/id?1025266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025266"},{"reference_url":"http://www.foolabs.com/xpdf/download.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.foolabs.com/xpdf/download.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/376500","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/376500"},{"reference_url":"http://www.kb.cert.org/vuls/id/MAPG-8ECL8X","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/MAPG-8ECL8X"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"},{"reference_url":"http://www.securityfocus.com/archive/1/517205/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/517205/100/0/threaded"},{"reference_url":"http://www.toucan-system.com/advisories/tssa-2011-01.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.toucan-system.com/advisories/tssa-2011-01.txt"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0728","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0728"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=692853","reference_id":"692853","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=692853"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:foolabs:xpdf:3.02pl4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.1:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.6:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.7:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.8:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:t1lib:t1lib:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1552","reference_id":"CVE-2011-1552","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1552"},{"reference_url":"https://security.gentoo.org/glsa/201701-57","reference_id":"GLSA-201701-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0062","reference_id":"RHSA-2012:0062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0137","reference_id":"RHSA-2012:0137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1201","reference_id":"RHSA-2012:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1201"},{"reference_url":"https://usn.ubuntu.com/1335-1/","reference_id":"USN-1335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935596?format=json","purl":"pkg:deb/debian/poppler@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2011-1552"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z77s-ej5r-rbcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56086?format=json","vulnerability_id":"VCID-zgja-p6ey-2kex","summary":"Multiple vulnerabilities have been found in Poppler, the worst of\n    which could allow the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9408.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9408","reference_id":"","reference_type":"","scores":[{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77441","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.7758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77565","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77472","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77453","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77482","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77517","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01046","scoring_system":"epss","scoring_elements":"0.77524","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1458702","reference_id":"1458702","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1458702"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864009","reference_id":"864009","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864009"},{"reference_url":"https://security.gentoo.org/glsa/201801-17","reference_id":"GLSA-201801-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-17"},{"reference_url":"https://usn.ubuntu.com/3350-1/","reference_id":"USN-3350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3350-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935603?format=json","purl":"pkg:deb/debian/poppler@0.57.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.57.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2017-9408"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zgja-p6ey-2kex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31249?format=json","vulnerability_id":"VCID-zn54-s7jz-ruh8","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4654.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4654.json"},{"reference_url":"https://access.redhat.com/security/cve/cve-2010-4654","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/cve-2010-4654"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4654","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6455","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64396","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6445","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6448","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64504","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64519","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64517","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201310-03.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201310-03.xml"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2010-4654","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2010-4654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=672181","reference_id":"672181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=672181"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4654","reference_id":"CVE-2010-4654","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4654"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935594?format=json","purl":"pkg:deb/debian/poppler@0.16.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.16.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2010-4654"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zn54-s7jz-ruh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31240?format=json","vulnerability_id":"VCID-zr8n-mfu1-4yg4","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3606.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3606","reference_id":"","reference_type":"","scores":[{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.8942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89465","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89474","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.8949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04772","scoring_system":"epss","scoring_elements":"0.89491","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=526877","reference_id":"526877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=526877"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287","reference_id":"551287","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551287"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289","reference_id":"551289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551289"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1500","reference_id":"RHSA-2009:1500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1501","reference_id":"RHSA-2009:1501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1502","reference_id":"RHSA-2009:1502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1502"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935591?format=json","purl":"pkg:deb/debian/poppler@0.12.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.12.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2009-3606"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zr8n-mfu1-4yg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83018?format=json","vulnerability_id":"VCID-zzy2-1yr8-83cf","summary":"poppler: reachable abort in Object.h","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19058.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19058","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50976","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51029","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51011","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51108","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5111","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51093","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51009","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649435","reference_id":"1649435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649435"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913177","reference_id":"913177","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2022","reference_id":"RHSA-2019:2022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2022"},{"reference_url":"https://usn.ubuntu.com/3837-1/","reference_id":"USN-3837-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3837-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935606?format=json","purl":"pkg:deb/debian/poppler@0.85.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.85.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935578?format=json","purl":"pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935576?format=json","purl":"pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-48d5-zxmm-r3g4"},{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-anb3-1s96-wbaq"},{"vulnerability":"VCID-ygrf-gq35-fkfd"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"},{"vulnerability":"VCID-yyxy-juya-a3f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935580?format=json","purl":"pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a8zz-dfdm-1uf7"},{"vulnerability":"VCID-yy6j-1h5z-wbgp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935579?format=json","purl":"pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie"}],"aliases":["CVE-2018-19058"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zzy2-1yr8-83cf"}],"risk_score":"3.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie"}