{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63535?format=json","vulnerability_id":"VCID-p3a2-3n7h-gugk","summary":"security update","aliases":[{"alias":"CVE-2019-1010006"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585600?format=json","purl":"pkg:deb/debian/atril@1.22.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.22.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1052152?format=json","purl":"pkg:deb/debian/atril@1.24.0-1%2Bdeb11u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.24.0-1%252Bdeb11u1"},{"url":"http://public2.vulnerablecode.io/api/packages/583794?format=json","purl":"pkg:deb/debian/atril@1.24.0-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.24.0-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583795?format=json","purl":"pkg:deb/debian/atril@1.26.0-2%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.26.0-2%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583796?format=json","purl":"pkg:deb/debian/atril@1.26.2-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.26.2-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583797?format=json","purl":"pkg:deb/debian/atril@1.28.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.28.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1036871?format=json","purl":"pkg:deb/debian/evince@3.22.1-3%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.22.1-3%252Bdeb9u2"},{"url":"http://public2.vulnerablecode.io/api/packages/586083?format=json","purl":"pkg:deb/debian/evince@3.27.92-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.27.92-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1049368?format=json","purl":"pkg:deb/debian/evince@3.30.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8ern-kbeb-j3e2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.30.2-3%252Bdeb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/582688?format=json","purl":"pkg:deb/debian/evince@3.38.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.38.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582689?format=json","purl":"pkg:deb/debian/evince@43.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@43.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582690?format=json","purl":"pkg:deb/debian/evince@48.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@48.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582691?format=json","purl":"pkg:deb/debian/evince@49~alpha-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@49~alpha-2%3Fdistro=trixie"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036500?format=json","purl":"pkg:deb/debian/atril@1.8.0%2Bdfsg1-2~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-95mh-919w-43as"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.8.0%252Bdfsg1-2~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1036501?format=json","purl":"pkg:deb/debian/atril@1.8.1%2Bdfsg1-4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-95mh-919w-43as"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.8.1%252Bdfsg1-4"},{"url":"http://public2.vulnerablecode.io/api/packages/1036502?format=json","purl":"pkg:deb/debian/atril@1.8.1%2Bdfsg1-4%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-95mh-919w-43as"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.8.1%252Bdfsg1-4%252Bdeb8u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037667?format=json","purl":"pkg:deb/debian/atril@1.16.1-2%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-95mh-919w-43as"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.16.1-2%252Bdeb9u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1052151?format=json","purl":"pkg:deb/debian/atril@1.20.3-1%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-95mh-919w-43as"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/atril@1.20.3-1%252Bdeb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1036481?format=json","purl":"pkg:deb/debian/evince@0.1.5-2sarge1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-assn-sdbh-6kad"},{"vulnerability":"VCID-b1cb-tmbk-83ah"},{"vulnerability":"VCID-cn18-pfwr-aucd"},{"vulnerability":"VCID-ewyd-gk3z-9ket"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-pxd5-e3jw-2ydu"},{"vulnerability":"VCID-tepn-rswh-ybd9"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-uwx5-tjc3-8ka5"},{"vulnerability":"VCID-v24q-8eqq-17ak"},{"vulnerability":"VCID-vws2-991u-bycg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@0.1.5-2sarge1"},{"url":"http://public2.vulnerablecode.io/api/packages/1036482?format=json","purl":"pkg:deb/debian/evince@0.4.0-5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-assn-sdbh-6kad"},{"vulnerability":"VCID-b1cb-tmbk-83ah"},{"vulnerability":"VCID-cn18-pfwr-aucd"},{"vulnerability":"VCID-ewyd-gk3z-9ket"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-pxd5-e3jw-2ydu"},{"vulnerability":"VCID-tepn-rswh-ybd9"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-uwx5-tjc3-8ka5"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@0.4.0-5"},{"url":"http://public2.vulnerablecode.io/api/packages/1036483?format=json","purl":"pkg:deb/debian/evince@2.22.2-4~lenny2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-assn-sdbh-6kad"},{"vulnerability":"VCID-b1cb-tmbk-83ah"},{"vulnerability":"VCID-cn18-pfwr-aucd"},{"vulnerability":"VCID-ewyd-gk3z-9ket"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-pxd5-e3jw-2ydu"},{"vulnerability":"VCID-tepn-rswh-ybd9"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-uwx5-tjc3-8ka5"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@2.22.2-4~lenny2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036484?format=json","purl":"pkg:deb/debian/evince@2.30.3-2%2Bsqueeze1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-b1cb-tmbk-83ah"},{"vulnerability":"VCID-cn18-pfwr-aucd"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-tepn-rswh-ybd9"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-uwx5-tjc3-8ka5"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@2.30.3-2%252Bsqueeze1"},{"url":"http://public2.vulnerablecode.io/api/packages/1036485?format=json","purl":"pkg:deb/debian/evince@3.4.0-3.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-tepn-rswh-ybd9"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.4.0-3.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1036486?format=json","purl":"pkg:deb/debian/evince@3.14.1-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.14.1-2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036487?format=json","purl":"pkg:deb/debian/evince@3.14.1-2%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.14.1-2%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036871?format=json","purl":"pkg:deb/debian/evince@3.22.1-3%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-19yj-kyhq-c7cc"},{"vulnerability":"VCID-8ern-kbeb-j3e2"},{"vulnerability":"VCID-p3a2-3n7h-gugk"},{"vulnerability":"VCID-uvmx-ktr5-jkg2"},{"vulnerability":"VCID-v24q-8eqq-17ak"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/evince@3.22.1-3%252Bdeb9u2"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010006.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010006.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-1010006","reference_id":"","reference_type":"","scores":[{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61254","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61275","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61302","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61206","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61752","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61784","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61772","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61767","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61778","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61866","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6188","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61897","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61613","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61687","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61717","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61737","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-1010006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730582","reference_id":"1730582","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730582"},{"reference_url":"https://usn.ubuntu.com/4067-1/","reference_id":"USN-4067-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4067-1/"},{"reference_url":"https://usn.ubuntu.com/7274-1/","reference_id":"USN-7274-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7274-1/"}],"weaknesses":[{"cwe_id":120,"name":"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","description":"The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow."},{"cwe_id":400,"name":"Uncontrolled Resource Consumption","description":"The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources."},{"cwe_id":94,"name":"Improper Control of Generation of Code ('Code Injection')","description":"The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment."}],"exploits":[],"severity_range_score":"5.3 - 7.3","exploitability":"0.5","weighted_severity":"4.8","risk_score":2.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p3a2-3n7h-gugk"}