Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/935590?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "poppler", "version": "0.10.6-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "0.12.2-1", "latest_non_vulnerable_version": "25.03.0-11.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31235?format=api", "vulnerability_id": "VCID-4jfu-4w71-g7bt", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97303", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97309", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97314", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97322", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97324", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97325", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97326", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97334", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97338", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97339", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97342", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97345", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97351", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.9736", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97365", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.39915", "scoring_system": "epss", "scoring_elements": "0.97372", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1187" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495906", "reference_id": "495906", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495906" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1187" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jfu-4w71-g7bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31227?format=api", "vulnerability_id": "VCID-65sa-tagy-3ybs", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0799.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0799", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76577", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76601", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76643", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76631", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76663", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76669", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76682", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.767", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76718", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76706", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76725", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76771", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0799" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495886", "reference_id": "495886", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495886" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0799" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-65sa-tagy-3ybs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31233?format=api", "vulnerability_id": "VCID-68rw-a4ah-5khm", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91521", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91532", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91533", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91554", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91549", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91557", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91555", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91567", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.9158", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.9159", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91588", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91598", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.07101", "scoring_system": "epss", "scoring_elements": "0.91606", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495896", "reference_id": "495896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495896" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1182" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-68rw-a4ah-5khm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31225?format=api", "vulnerability_id": "VCID-ctb2-8h4y-vybd", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8988", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89916", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89927", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89934", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89931", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89947", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89946", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89944", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89958", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89973", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89985", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8998", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89988", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.90003", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490625", "reference_id": "490625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490625" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0166" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31223?format=api", "vulnerability_id": "VCID-dgb8-nes9-8fb7", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.8494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84959", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85008", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85023", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85048", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85056", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85054", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85071", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85095", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85116", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85112", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85127", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.8516", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490614", "reference_id": "490614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490614" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0147" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31230?format=api", "vulnerability_id": "VCID-gbm8-vcwy-u3g2", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1179.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1179", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96426", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96433", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.9644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96456", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96457", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96466", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.9647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96473", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96474", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96475", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96477", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96484", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96486", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96493", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.96495", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.965", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.27841", "scoring_system": "epss", "scoring_elements": "0.9651", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889", "reference_id": "495889", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495889" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1179" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbm8-vcwy-u3g2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88236?format=api", "vulnerability_id": "VCID-gbuy-ru9c-h3en", "summary": "poppler/evince: DoS via crafted PDF file", "references": [ { "reference_url": "http://bugs.freedesktop.org/show_bug.cgi?id=19790", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.freedesktop.org/show_bug.cgi?id=19790" }, { "reference_url": "http://lists.freedesktop.org/archives/poppler/2009-January/004406.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.freedesktop.org/archives/poppler/2009-January/004406.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0755.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0755.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0755", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95901", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95917", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95921", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95933", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95936", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95938", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95949", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.23185", "scoring_system": "epss", "scoring_elements": "0.95956", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.96156", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.96168", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.96128", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.96129", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.9613", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.96138", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.96145", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.96148", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.24435", "scoring_system": "epss", "scoring_elements": "0.96151", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755" }, { "reference_url": "http://secunia.com/advisories/33853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33853" }, { "reference_url": "http://secunia.com/advisories/35685", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35685" }, { "reference_url": "http://secunia.com/advisories/37114", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/37114" }, { "reference_url": "http://wiki.rpath.com/Advisories:rPSA-2009-0059", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0059" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1941", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1941" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2009/02/13/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2009/02/13/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2009/02/19/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2009/02/19/2" }, { "reference_url": "http://www.securityfocus.com/archive/1/502761/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/502761/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/33749", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33749" }, { "reference_url": "http://www.ubuntu.com/usn/USN-850-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-850-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=488337", "reference_id": "488337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488337" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518478", "reference_id": "518478", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518478" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0755", "reference_id": "CVE-2009-0755", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0755" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32800.txt", "reference_id": "CVE-2009-0756;OSVDB-51914;CVE-2009-0755", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32800.txt" }, { "reference_url": "https://www.securityfocus.com/bid/33749/info", "reference_id": "CVE-2009-0756;OSVDB-51914;CVE-2009-0755", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/33749/info" }, { "reference_url": "https://usn.ubuntu.com/850-1/", "reference_id": "USN-850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/850-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0755" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbuy-ru9c-h3en" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31231?format=api", "vulnerability_id": "VCID-jvuz-2phs-87du", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92498", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92526", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.9253", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92538", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92547", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92549", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92551", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92552", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92548", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92558", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.9257", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92579", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92583", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92588", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.08831", "scoring_system": "epss", "scoring_elements": "0.92613", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495892", "reference_id": "495892", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495892" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1180" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuz-2phs-87du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31229?format=api", "vulnerability_id": "VCID-rm6a-c4rf-f7hc", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0800.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0800", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92575", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92581", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.926", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92605", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.9261", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92611", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92624", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92623", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92628", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92633", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92645", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92657", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92659", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.92665", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.08985", "scoring_system": "epss", "scoring_elements": "0.9269", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0800" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495887", "reference_id": "495887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495887" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0800" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rm6a-c4rf-f7hc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31236?format=api", "vulnerability_id": "VCID-uczb-yext-6yfq", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1188.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1188", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95736", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95745", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95753", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95786", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95787", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95789", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.958", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95802", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95809", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95814", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95819", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.21975", "scoring_system": "epss", "scoring_elements": "0.95833", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495907", "reference_id": "495907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495907" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779", "reference_id": "575779", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=575779" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1188" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uczb-yext-6yfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31232?format=api", "vulnerability_id": "VCID-uny2-k19n-1bb2", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85086", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.8516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85177", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85179", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.852", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85209", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85207", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85221", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85247", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85266", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85261", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85275", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02433", "scoring_system": "epss", "scoring_elements": "0.85311", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495894", "reference_id": "495894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495894" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1181" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uny2-k19n-1bb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88241?format=api", "vulnerability_id": "VCID-v15u-sguq-skg9", "summary": "poppler/evince: DoS via crafted PDF file", "references": [ { "reference_url": "http://bugs.freedesktop.org/show_bug.cgi?id=19702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.freedesktop.org/show_bug.cgi?id=19702" }, { "reference_url": "http://lists.freedesktop.org/archives/poppler/2009-January/004403.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.freedesktop.org/archives/poppler/2009-January/004403.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0756.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0756.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0756", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94291", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94311", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94313", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94322", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94327", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94347", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94353", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.13982", "scoring_system": "epss", "scoring_elements": "0.94352", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.94576", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.9459", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.94544", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.94542", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.94543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.94549", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.94556", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.94566", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.14855", "scoring_system": "epss", "scoring_elements": "0.9457", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756" }, { "reference_url": "http://secunia.com/advisories/33853", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33853" }, { "reference_url": "http://secunia.com/advisories/35685", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35685" }, { "reference_url": "http://wiki.rpath.com/Advisories:rPSA-2009-0059", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0059" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2009/02/13/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2009/02/13/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2009/02/19/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2009/02/19/2" }, { "reference_url": "http://www.securityfocus.com/archive/1/502761/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/502761/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/33749", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33749" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=488339", "reference_id": "488339", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488339" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518478", "reference_id": "518478", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518478" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0756", "reference_id": "CVE-2009-0756", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0756" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0756" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v15u-sguq-skg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31234?format=api", "vulnerability_id": "VCID-vudr-8rrg-hufx", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82232", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82285", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82312", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82306", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.823", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82337", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82358", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82368", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82373", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82389", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82411", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82432", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.8243", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82447", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01703", "scoring_system": "epss", "scoring_elements": "0.82487", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=495899", "reference_id": "495899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495899" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1183" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vudr-8rrg-hufx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31221?format=api", "vulnerability_id": "VCID-ynvq-nzrq-9bca", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82514", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82568", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82594", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82604", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8261", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8263", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82651", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82671", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8267", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82686", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82727", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612", "reference_id": "490612", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935590?format=api", "purl": "pkg:deb/debian/poppler@0.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935578?format=api", "purl": "pkg:deb/debian/poppler@20.09.0-3.1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@20.09.0-3.1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935576?format=api", "purl": "pkg:deb/debian/poppler@22.12.0-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-48d5-zxmm-r3g4" }, { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-anb3-1s96-wbaq" }, { "vulnerability": "VCID-ygrf-gq35-fkfd" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" }, { "vulnerability": "VCID-yyxy-juya-a3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@22.12.0-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935580?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-5%2Bdeb13u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8zz-dfdm-1uf7" }, { "vulnerability": "VCID-yy6j-1h5z-wbgp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-5%252Bdeb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935579?format=api", "purl": "pkg:deb/debian/poppler@25.03.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@25.03.0-11.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0146" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/poppler@0.10.6-1%3Fdistro=trixie" }