{"api_version":"1","generated_at":"2026-04-23T08:03:54+00:00","cve":"CVE-2004-0888","urls":{"html":"https://cve.report/CVE-2004-0888","api":"https://cve.report/api/cve/CVE-2004-0888.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2004-0888","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2004-0888"},"summary":{"title":"CVE-2004-0888","description":"Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-01-27 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.redhat.com/support/errata/RHSA-2005-066.html","name":"http://www.redhat.com/support/errata/RHSA-2005-066.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-354.html","name":"http://www.redhat.com/support/errata/RHSA-2005-354.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:116","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:116","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.fedora.us/show_bug.cgi?id=2353","name":"https://bugzilla.fedora.us/show_bug.cgi?id=2353","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17818","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17818","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886","name":"http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Home - Conectiva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml","name":"http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Gentoo Linux Documentation\n--\n  Xpdf, CUPS: Multiple integer overflows","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=110815379627883&w=2","name":"http://marc.info/?l=bugtraq&m=110815379627883&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'[FLSA-2005:2352] Updated Xpdf package fixes security issues' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2004/dsa-581","name":"http://www.debian.org/security/2004/dsa-581","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-581-1 xpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2004/dsa-573","name":"http://www.debian.org/security/2004/dsa-573","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-573-1 cupsys","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:113","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:113","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml","name":"http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Gentoo Linux Documentation\n--\n  GPdf, KPDF, KOffice: Vulnerabilities in included xpdf","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:114","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:114","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2004/dsa-599","name":"http://www.debian.org/security/2004/dsa-599","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-599-1 tetex-bin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:115","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:115","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2004-543.html","name":"http://www.redhat.com/support/errata/RHSA-2004-543.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/11501","name":"http://www.securityfocus.com/bid/11501","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Xpdf PDFTOPS Multiple Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://marc.info/?l=bugtraq&m=109880927526773&w=2","name":"http://marc.info/?l=bugtraq&m=109880927526773&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'SUSE Security Announcement: xpdf, gpdf, kpdf, pdftohtml, cups' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.ubuntu.com/usn/usn-9-1/","name":"https://www.ubuntu.com/usn/usn-9-1/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"usn/usn-9-1 - Ubuntu Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2004-592.html","name":"http://www.redhat.com/support/errata/RHSA-2004-592.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2004-0888","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0888","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"alpha","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"arm","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"hppa","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"ia-32","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"ia-64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"m68k","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"mips","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"mipsel","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"ppc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"s-390","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.0","cpe7":"*","cpe8":"sparc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.0.4_8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.14","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.17","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.19_rc5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.4_2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.4_3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.4_5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"gentoo","cpe5":"linux","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnome","cpe5":"gpdf","cpe6":"0.112","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnome","cpe5":"gpdf","cpe6":"0.131","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"kde","cpe5":"kde","cpe6":"3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"kde","cpe5":"kde","cpe6":"3.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"kde","cpe5":"kde","cpe6":"3.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"kde","cpe5":"kde","cpe6":"3.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"kde","cpe5":"kde","cpe6":"3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"kde","cpe5":"kde","cpe6":"3.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.3_beta1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.3_beta2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"koffice","cpe6":"1.3_beta3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kde","cpe5":"kpdf","cpe6":"3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pdftohtml","cpe5":"pdftohtml","cpe6":"0.32a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pdftohtml","cpe5":"pdftohtml","cpe6":"0.32b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pdftohtml","cpe5":"pdftohtml","cpe6":"0.33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pdftohtml","cpe5":"pdftohtml","cpe6":"0.33a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pdftohtml","cpe5":"pdftohtml","cpe6":"0.34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pdftohtml","cpe5":"pdftohtml","cpe6":"0.35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pdftohtml","cpe5":"pdftohtml","cpe6":"0.36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"advanced_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"advanced_server_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"enterprise_server_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"workstation","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"workstation_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"advanced_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"workstation_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora_core","cpe6":"core_2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux_advanced_workstation","cpe6":"2.1","cpe7":"*","cpe8":"ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux_advanced_workstation","cpe6":"2.1","cpe7":"*","cpe8":"itanium_processor","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"8.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.0","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux","cpe6":"9.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"1.0.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tetex","cpe5":"tetex","cpe6":"2.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"4.1","cpe7":"*","cpe8":"ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubuntu","cpe5":"ubuntu_linux","cpe6":"4.1","cpe7":"*","cpe8":"ppc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"0.90","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"0.91","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"0.92","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"0.93","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"1.0a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"888","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xpdf","cpe5":"xpdf","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T00:31:47.615Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"RHSA-2004:592","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2004-592.html"},{"name":"11501","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/11501"},{"name":"RHSA-2005:066","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-066.html"},{"name":"USN-9-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://www.ubuntu.com/usn/usn-9-1/"},{"name":"MDKSA-2004:113","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:113"},{"name":"GLSA-200410-20","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml"},{"name":"DSA-581","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2004/dsa-581"},{"name":"DSA-573","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2004/dsa-573"},{"name":"FLSA:2353","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://bugzilla.fedora.us/show_bug.cgi?id=2353"},{"name":"MDKSA-2004:116","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:116"},{"name":"DSA-599","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2004/dsa-599"},{"name":"xpdf-pdf-bo(17818)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17818"},{"name":"RHSA-2005:354","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-354.html"},{"name":"RHSA-2004:543","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2004-543.html"},{"name":"oval:org.mitre.oval:def:9714","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714"},{"name":"CLA-2004:886","tags":["vendor-advisory","x_refsource_CONECTIVA","x_transferred"],"url":"http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886"},{"name":"MDKSA-2004:114","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:114"},{"name":"GLSA-200410-30","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml"},{"name":"MDKSA-2004:115","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:115"},{"name":"SUSE-SA:2004:039","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=109880927526773&w=2"},{"name":"FLSA:2352","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=110815379627883&w=2"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2004-10-21T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"RHSA-2004:592","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2004-592.html"},{"name":"11501","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/11501"},{"name":"RHSA-2005:066","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-066.html"},{"name":"USN-9-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://www.ubuntu.com/usn/usn-9-1/"},{"name":"MDKSA-2004:113","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:113"},{"name":"GLSA-200410-20","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml"},{"name":"DSA-581","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2004/dsa-581"},{"name":"DSA-573","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2004/dsa-573"},{"name":"FLSA:2353","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://bugzilla.fedora.us/show_bug.cgi?id=2353"},{"name":"MDKSA-2004:116","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:116"},{"name":"DSA-599","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2004/dsa-599"},{"name":"xpdf-pdf-bo(17818)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17818"},{"name":"RHSA-2005:354","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-354.html"},{"name":"RHSA-2004:543","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2004-543.html"},{"name":"oval:org.mitre.oval:def:9714","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714"},{"name":"CLA-2004:886","tags":["vendor-advisory","x_refsource_CONECTIVA"],"url":"http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886"},{"name":"MDKSA-2004:114","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:114"},{"name":"GLSA-200410-30","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml"},{"name":"MDKSA-2004:115","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:115"},{"name":"SUSE-SA:2004:039","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://marc.info/?l=bugtraq&m=109880927526773&w=2"},{"name":"FLSA:2352","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://marc.info/?l=bugtraq&m=110815379627883&w=2"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2004-0888","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"RHSA-2004:592","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2004-592.html"},{"name":"11501","refsource":"BID","url":"http://www.securityfocus.com/bid/11501"},{"name":"RHSA-2005:066","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2005-066.html"},{"name":"USN-9-1","refsource":"UBUNTU","url":"https://www.ubuntu.com/usn/usn-9-1/"},{"name":"MDKSA-2004:113","refsource":"MANDRAKE","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:113"},{"name":"GLSA-200410-20","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml"},{"name":"DSA-581","refsource":"DEBIAN","url":"http://www.debian.org/security/2004/dsa-581"},{"name":"DSA-573","refsource":"DEBIAN","url":"http://www.debian.org/security/2004/dsa-573"},{"name":"FLSA:2353","refsource":"FEDORA","url":"https://bugzilla.fedora.us/show_bug.cgi?id=2353"},{"name":"MDKSA-2004:116","refsource":"MANDRAKE","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:116"},{"name":"DSA-599","refsource":"DEBIAN","url":"http://www.debian.org/security/2004/dsa-599"},{"name":"xpdf-pdf-bo(17818)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17818"},{"name":"RHSA-2005:354","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2005-354.html"},{"name":"RHSA-2004:543","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2004-543.html"},{"name":"oval:org.mitre.oval:def:9714","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714"},{"name":"CLA-2004:886","refsource":"CONECTIVA","url":"http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886"},{"name":"MDKSA-2004:114","refsource":"MANDRAKE","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:114"},{"name":"GLSA-200410-30","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml"},{"name":"MDKSA-2004:115","refsource":"MANDRAKE","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:115"},{"name":"SUSE-SA:2004:039","refsource":"SUSE","url":"http://marc.info/?l=bugtraq&m=109880927526773&w=2"},{"name":"FLSA:2352","refsource":"FEDORA","url":"http://marc.info/?l=bugtraq&m=110815379627883&w=2"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2004-0888","datePublished":"2004-10-26T04:00:00.000Z","dateReserved":"2004-09-22T00:00:00.000Z","dateUpdated":"2024-08-08T00:31:47.615Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-01-27 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"68BD578F-CCAD-4515-9205-EB4F297C6DB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","matchCriteriaId":"F3182CA2-7375-43BC-A0E5-DE11D4B65EE3"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"FCF4C8D0-3030-4DD5-800B-76A582A4CD0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"734D0C2C-F71F-461A-87EE-202C6B706753"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","matchCriteriaId":"3F0F402D-5CD0-4477-8B59-C753CECB02BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","matchCriteriaId":"959F7AFA-ED20-434C-993F-06C2A8574662"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","matchCriteriaId":"D4F5A0A4-2884-46CA-A846-8B954EB80CFA"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","matchCriteriaId":"1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","matchCriteriaId":"35E65857-12C7-49DE-AD27-3CACD456231C"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","matchCriteriaId":"47CEF035-57A6-470B-916A-E5562C28E866"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","matchCriteriaId":"4E26BB15-4CF8-4496-A7F7-EB34C444EF72"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","matchCriteriaId":"D414984E-4F6B-4278-8346-968587E4B18E"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","matchCriteriaId":"33C36DCB-2FDD-44E6-85E8-875575AAE69E"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","matchCriteriaId":"7C4B7C23-0C54-4FBA-A774-9CC1E148376E"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","matchCriteriaId":"9FA0EF14-33E6-4D44-B86E-F04014EA3C8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","matchCriteriaId":"A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","matchCriteriaId":"A786A770-919E-4E23-949D-D836F316618A"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","matchCriteriaId":"00A2249C-73DE-434E-A41F-4EDB0ADC0845"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","matchCriteriaId":"73AB4D3D-FF35-4A50-A144-3AD41F6F2E55"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","matchCriteriaId":"FB7653F1-70E2-423F-A6A9-30333644B506"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*","matchCriteriaId":"2E70576E-C253-4F8B-A93E-14CC2EE7114D"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*","matchCriteriaId":"832C5512-B473-40E8-BF4F-EC6ABFE46749"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*","matchCriteriaId":"053435DD-BFDF-4C39-9919-11C42D569085"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"E9BB1A3C-3348-4545-A513-E504B33F72AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"CD45E2C8-0B0E-484F-8050-94BF77798183"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"4EAA654E-9DD4-4614-92D7-EF4D676B3A18"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*","matchCriteriaId":"89C96FC9-40DB-467D-A701-49F97A1B887D"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*","matchCriteriaId":"76128BDC-2CA7-4AE7-8C4F-BCB3835CA938"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*","matchCriteriaId":"0B2517C7-27EF-4961-91C3-CA33219AFF2E"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*","matchCriteriaId":"EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*","matchCriteriaId":"EE346726-71D6-438B-B600-A7E107332816"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*","matchCriteriaId":"87E85020-B4DB-4011-BDD0-1C8967D45A84"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*","matchCriteriaId":"8189A9AB-F685-40E2-944F-8BD3DD6FA0A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*","matchCriteriaId":"C33B8585-FA5F-4210-A997-615BCEE1726F"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*","matchCriteriaId":"F4AE4C34-C497-426F-AC0D-1805A50582EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*","matchCriteriaId":"A2989EFF-07B9-4EF2-B6C1-59E4F52FDC92"},{"vulnerable":true,"criteria":"cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*","matchCriteriaId":"A3970101-5E83-49FD-BCB6-D9176D46B5A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*","matchCriteriaId":"C86C7D6F-C39E-4403-86C6-F87599570E97"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*","matchCriteriaId":"236005A1-C175-44D3-8D0C-C48F943F3D66"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"0AF2AD80-5E65-4B57-933B-C395E98EF10D"},{"vulnerable":true,"criteria":"cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"07C92A0E-1DDA-4F83-A904-24A35C38883A"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*","matchCriteriaId":"28CC6233-E207-40CC-81FF-A8670EEA4295"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*","matchCriteriaId":"64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*","matchCriteriaId":"0304E1E3-8766-40D0-8879-A652B4E9E72D"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*","matchCriteriaId":"188F1343-8082-4B54-8DA4-E344818ABD52"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*","matchCriteriaId":"B95DA7DE-B786-4EE7-A3F4-C077A7986D5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*","matchCriteriaId":"C5306C05-4A71-4175-8C22-F2DE0F2FE4C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*","matchCriteriaId":"3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*","matchCriteriaId":"CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*","matchCriteriaId":"354487CF-0086-4AE2-872B-0032E3EB89EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*","matchCriteriaId":"1169B802-7279-437F-AF59-621A67DC92EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7B93B3ED-AF82-49A9-8C7F-E5F652F19669"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"2CAE037F-111C-4A76-8FFE-716B74D65EF3"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","matchCriteriaId":"A6B060E4-B5A6-4469-828E-211C52542547"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","matchCriteriaId":"974C3541-990C-4CD4-A05A-38FA74A84632"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","matchCriteriaId":"6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","matchCriteriaId":"58792F77-B06F-4780-BA25-FE1EE6C3FDD9"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","matchCriteriaId":"C9419322-572F-4BB6-8416-C5E96541CF33"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","matchCriteriaId":"BFC50555-C084-46A3-9C9F-949C5E3BB448"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","matchCriteriaId":"9C25D6E1-D283-4CEA-B47B-60C47A5C0797"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","matchCriteriaId":"AD18A446-C634-417E-86AC-B19B6DDDC856"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","matchCriteriaId":"E4BB852E-61B2-4842-989F-C6C0C901A8D7"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","matchCriteriaId":"24DD9D59-E2A2-4116-A887-39E8CC2004FC"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","matchCriteriaId":"F28D7457-607E-4E0C-909A-413F91CFCD82"},{"vulnerable":true,"criteria":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"647BA336-5538-4972-9271-383A0EC9378E"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*","matchCriteriaId":"82F69843-978D-4686-BC5B-1D09DA4A21BD"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"ACEE0AED-7918-41E9-A902-AC4070E03132"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*","matchCriteriaId":"81E19472-47B4-4398-A188-CA5A5D3E7060"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"D17407A2-089E-43A5-9BD5-EFF966F5CC16"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*","matchCriteriaId":"9C4B436D-8D6A-473E-B707-26147208808B"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"1E26B353-4985-4116-B97A-5767CDC732F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","matchCriteriaId":"2641EE56-6F9D-400B-B456-877F4DA79B10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","matchCriteriaId":"A4A9461E-C117-42EC-9F14-DF2A82BA7C5D"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"E0B458EA-495E-40FA-9379-C03757F7B1EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","matchCriteriaId":"409E324A-C040-494F-A026-9DCAE01C07F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","matchCriteriaId":"1728AB5D-55A9-46B0-A412-6F7263CAEB5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","matchCriteriaId":"6474B775-C893-491F-A074-802AFB1FEDD8"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","matchCriteriaId":"78B46FFA-5B09-473E-AD33-3DB18BD0DAFE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"EC79FF22-2664-4C40-B0B3-6D23B5F45162"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","matchCriteriaId":"0EFE2E73-9536-41A9-B83B-0A06B54857F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","matchCriteriaId":"E6996B14-925B-46B8-982F-3545328B506B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","matchCriteriaId":"84A50ED3-FD0D-4038-B3E7-CC65D166C968"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*","matchCriteriaId":"777F9EC0-2919-45CA-BFF8-78A02537C513"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"28CD54FE-D682-4063-B7C3-8B29B26B39AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*","matchCriteriaId":"F8C55338-3372-413F-82E3-E1B476D6F41A"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*","matchCriteriaId":"1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*","matchCriteriaId":"FB0E2D3B-B50A-46C2-BA1E-3E014DE91954"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*","matchCriteriaId":"56EF103F-5668-4754-A83B-D3662D0CE815"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*","matchCriteriaId":"CFABFCE5-4F86-4AE8-9849-BC360AC72098"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*","matchCriteriaId":"CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","matchCriteriaId":"6E94583A-5184-462E-9FC4-57B35DA06DA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","matchCriteriaId":"E905FAAD-37B6-4DD0-A752-2974F8336273"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2004","CveId":"888","Ordinal":"1","Title":"CVE-2004-0888","CVE":"CVE-2004-0888","Year":"2004"},"notes":[{"CveYear":"2004","CveId":"888","Ordinal":"1","NoteData":"Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.","Type":"Description","Title":"CVE-2004-0888"},{"CveYear":"2004","CveId":"888","Ordinal":"2","NoteData":"2004-10-26","Type":"Other","Title":"Published"},{"CveYear":"2004","CveId":"888","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}