Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
Typedeb
Namespacedebian
Nameghostscript
Version9.53.3~dfsg-7+deb11u7
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version10.07.0~dfsg-2
Latest_non_vulnerable_version10.07.0~dfsg-2
Affected_by_vulnerabilities
0
url VCID-1nh4-crmx-jfb5
vulnerability_id VCID-1nh4-crmx-jfb5
summary ghostscript: Integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38560.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38560.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38560
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01801
published_at 2026-04-21T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01728
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01739
published_at 2026-04-08T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01748
published_at 2026-04-09T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01733
published_at 2026-04-11T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01723
published_at 2026-04-12T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01721
published_at 2026-04-13T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.0171
published_at 2026-04-16T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01711
published_at 2026-04-18T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01737
published_at 2026-04-04T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01736
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38560
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38560
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224368
reference_id 2224368
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2224368
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-38560
reference_id CVE-2023-38560
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/
url https://access.redhat.com/security/cve/CVE-2023-38560
10
reference_url https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c
reference_id ?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/
url https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c
11
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=706898
reference_id show_bug.cgi?id=706898
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=706898
fixed_packages
0
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1
aliases CVE-2023-38560
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1nh4-crmx-jfb5
1
url VCID-7anb-rnxg-97h8
vulnerability_id VCID-7anb-rnxg-97h8
summary Artifex Ghostscript: Artifex Ghostscript: Denial of Service via stack-based buffer overflow in pdf_write_cmap
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59798.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59798
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03607
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03631
published_at 2026-04-07T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03622
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03632
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03654
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03611
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03583
published_at 2026-04-12T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03558
published_at 2026-04-13T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03532
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04147
published_at 2026-04-18T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04272
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59798
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116444
reference_id 1116444
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116444
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397225
reference_id 2397225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397225
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7
reference_id ?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:54:24Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7
7
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708539
reference_id show_bug.cgi?id=708539
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:54:24Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708539
8
reference_url https://usn.ubuntu.com/7782-1/
reference_id USN-7782-1
reference_type
scores
url https://usn.ubuntu.com/7782-1/
9
reference_url https://usn.ubuntu.com/7904-1/
reference_id USN-7904-1
reference_type
scores
url https://usn.ubuntu.com/7904-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2025-59798
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7anb-rnxg-97h8
2
url VCID-7u9a-5pkt-4fbf
vulnerability_id VCID-7u9a-5pkt-4fbf
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46956.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46956
reference_id
reference_type
scores
0
value 0.00301
scoring_system epss
scoring_elements 0.53424
published_at 2026-04-21T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.55637
published_at 2026-04-13T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.5561
published_at 2026-04-07T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55662
published_at 2026-04-08T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55665
published_at 2026-04-09T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55674
published_at 2026-04-11T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55654
published_at 2026-04-12T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55679
published_at 2026-04-18T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55675
published_at 2026-04-16T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.55608
published_at 2026-04-02T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.55634
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325047
reference_id 2325047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325047
5
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca
reference_id ?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca
7
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
9
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
10
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
11
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707895
reference_id show_bug.cgi?id=707895
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707895
12
reference_url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
reference_id suse-su-20243942-1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/
url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
13
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
14
reference_url https://usn.ubuntu.com/7138-1/
reference_id USN-7138-1
reference_type
scores
url https://usn.ubuntu.com/7138-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2024-46956
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7u9a-5pkt-4fbf
3
url VCID-8wfs-knnp-8ub1
vulnerability_id VCID-8wfs-knnp-8ub1
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27831.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27831
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.48463
published_at 2026-04-02T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.48501
published_at 2026-04-21T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.48498
published_at 2026-04-13T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48548
published_at 2026-04-16T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48543
published_at 2026-04-18T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48485
published_at 2026-04-12T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48438
published_at 2026-04-07T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48492
published_at 2026-04-08T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48488
published_at 2026-04-09T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48511
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27831
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354963
reference_id 2354963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354963
5
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708132
reference_id show_bug.cgi?id=708132
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:39:16Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708132
7
reference_url https://usn.ubuntu.com/7378-1/
reference_id USN-7378-1
reference_type
scores
url https://usn.ubuntu.com/7378-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2025-27831
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wfs-knnp-8ub1
4
url VCID-barv-t623-h3e5
vulnerability_id VCID-barv-t623-h3e5
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46951.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46951
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.32047
published_at 2026-04-21T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33919
published_at 2026-04-13T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33912
published_at 2026-04-07T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33955
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33987
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33985
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33942
published_at 2026-04-12T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.3394
published_at 2026-04-18T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33956
published_at 2026-04-16T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.34027
published_at 2026-04-02T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.34057
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46951
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325043
reference_id 2325043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325043
5
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f49812186baa7d1362880673408a6fbe8719b4f8
reference_id ?id=f49812186baa7d1362880673408a6fbe8719b4f8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f49812186baa7d1362880673408a6fbe8719b4f8
7
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
9
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
10
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
11
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707991
reference_id show_bug.cgi?id=707991
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707991
12
reference_url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
reference_id suse-su-20243942-1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/
url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
13
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
14
reference_url https://usn.ubuntu.com/7138-1/
reference_id USN-7138-1
reference_type
scores
url https://usn.ubuntu.com/7138-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2024-46951
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-barv-t623-h3e5
5
url VCID-bnpf-udu2-hqbk
vulnerability_id VCID-bnpf-udu2-hqbk
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27830.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27830
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07566
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07686
published_at 2026-04-21T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07634
published_at 2026-04-13T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07558
published_at 2026-04-16T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07547
published_at 2026-04-18T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07608
published_at 2026-04-04T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07583
published_at 2026-04-07T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07642
published_at 2026-04-08T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.0766
published_at 2026-04-09T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07661
published_at 2026-04-11T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07648
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27830
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27830
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354953
reference_id 2354953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354953
5
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708241
reference_id show_bug.cgi?id=708241
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:52Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708241
7
reference_url https://usn.ubuntu.com/7378-1/
reference_id USN-7378-1
reference_type
scores
url https://usn.ubuntu.com/7378-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2025-27830
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bnpf-udu2-hqbk
6
url VCID-c6ms-5wr2-kbfj
vulnerability_id VCID-c6ms-5wr2-kbfj
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27835.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27835
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07566
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07642
published_at 2026-04-08T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.0766
published_at 2026-04-09T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07661
published_at 2026-04-11T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07648
published_at 2026-04-12T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07634
published_at 2026-04-13T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07558
published_at 2026-04-16T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07608
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07583
published_at 2026-04-07T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09451
published_at 2026-04-21T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09306
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27835
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354947
reference_id 2354947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354947
5
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708131
reference_id show_bug.cgi?id=708131
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:46Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708131
7
reference_url https://usn.ubuntu.com/7378-1/
reference_id USN-7378-1
reference_type
scores
url https://usn.ubuntu.com/7378-1/
8
reference_url https://usn.ubuntu.com/7623-1/
reference_id USN-7623-1
reference_type
scores
url https://usn.ubuntu.com/7623-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2025-27835
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6ms-5wr2-kbfj
7
url VCID-eypv-n5ea-abgn
vulnerability_id VCID-eypv-n5ea-abgn
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46953.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46953
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28997
published_at 2026-04-21T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30592
published_at 2026-04-07T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30606
published_at 2026-04-18T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30624
published_at 2026-04-16T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30598
published_at 2026-04-13T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30644
published_at 2026-04-12T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30688
published_at 2026-04-11T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30684
published_at 2026-04-09T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30651
published_at 2026-04-08T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30728
published_at 2026-04-02T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30776
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46953
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325045
reference_id 2325045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325045
5
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=1f21a45df0fa3abec4cff12951022b192dda3c00
reference_id ?id=1f21a45df0fa3abec4cff12951022b192dda3c00
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=1f21a45df0fa3abec4cff12951022b192dda3c00
7
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
9
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
10
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
11
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707793
reference_id show_bug.cgi?id=707793
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707793
12
reference_url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
reference_id suse-su-20243942-1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/
url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
13
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
14
reference_url https://usn.ubuntu.com/7138-1/
reference_id USN-7138-1
reference_type
scores
url https://usn.ubuntu.com/7138-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2024-46953
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eypv-n5ea-abgn
8
url VCID-gv9z-e7t9-m7g6
vulnerability_id VCID-gv9z-e7t9-m7g6
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27832.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27832.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27832
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33978
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33862
published_at 2026-04-21T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33894
published_at 2026-04-18T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33871
published_at 2026-04-13T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33908
published_at 2026-04-16T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.34009
published_at 2026-04-04T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33863
published_at 2026-04-07T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33906
published_at 2026-04-08T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33938
published_at 2026-04-09T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33936
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27832
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27832
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354949
reference_id 2354949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354949
5
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
6
reference_url https://access.redhat.com/errata/RHSA-2025:21915
reference_id RHSA-2025:21915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21915
7
reference_url https://access.redhat.com/errata/RHSA-2025:22869
reference_id RHSA-2025:22869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22869
8
reference_url https://access.redhat.com/errata/RHSA-2025:23153
reference_id RHSA-2025:23153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23153
9
reference_url https://access.redhat.com/errata/RHSA-2025:7586
reference_id RHSA-2025:7586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7586
10
reference_url https://access.redhat.com/errata/RHSA-2025:7593
reference_id RHSA-2025:7593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7593
11
reference_url https://access.redhat.com/errata/RHSA-2025:8421
reference_id RHSA-2025:8421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8421
12
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708133
reference_id show_bug.cgi?id=708133
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:39:13Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708133
13
reference_url https://usn.ubuntu.com/7378-1/
reference_id USN-7378-1
reference_type
scores
url https://usn.ubuntu.com/7378-1/
14
reference_url https://usn.ubuntu.com/7623-1/
reference_id USN-7623-1
reference_type
scores
url https://usn.ubuntu.com/7623-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2025-27832
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gv9z-e7t9-m7g6
9
url VCID-j6nh-rfbg-z7f7
vulnerability_id VCID-j6nh-rfbg-z7f7
summary ghostscript: Improper release of objects in chunk_free_object during PCL to PDF conversion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1350.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1350.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1350
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53709
published_at 2026-04-01T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53729
published_at 2026-04-02T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53817
published_at 2026-04-21T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53782
published_at 2026-04-08T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53779
published_at 2026-04-09T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.53828
published_at 2026-04-11T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53811
published_at 2026-04-12T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53796
published_at 2026-04-13T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53832
published_at 2026-04-16T12:55:00Z
9
value 0.00305
scoring_system epss
scoring_elements 0.53837
published_at 2026-04-18T12:55:00Z
10
value 0.00305
scoring_system epss
scoring_elements 0.53756
published_at 2026-04-04T12:55:00Z
11
value 0.00305
scoring_system epss
scoring_elements 0.5373
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1350
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1350
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075523
reference_id 2075523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075523
5
reference_url https://bugs.ghostscript.com/attachment.cgi?id=22323
reference_id attachment.cgi?id=22323
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/
url https://bugs.ghostscript.com/attachment.cgi?id=22323
6
reference_url https://vuldb.com/?id.197290
reference_id ?id.197290
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/
url https://vuldb.com/?id.197290
7
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=705156
reference_id show_bug.cgi?id=705156
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=705156
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2022-1350
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6nh-rfbg-z7f7
10
url VCID-k2rj-x3d7-ryd2
vulnerability_id VCID-k2rj-x3d7-ryd2
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46955.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46955
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13337
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14608
published_at 2026-04-07T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14522
published_at 2026-04-18T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14515
published_at 2026-04-16T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14624
published_at 2026-04-13T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14678
published_at 2026-04-12T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14717
published_at 2026-04-11T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14756
published_at 2026-04-09T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14697
published_at 2026-04-08T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14728
published_at 2026-04-02T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14803
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46955
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325042
reference_id 2325042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325042
5
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6
reference_id ?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6
7
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
8
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707990
reference_id show_bug.cgi?id=707990
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707990
9
reference_url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
reference_id suse-su-20243942-1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/
url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
10
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
11
reference_url https://usn.ubuntu.com/7138-1/
reference_id USN-7138-1
reference_type
scores
url https://usn.ubuntu.com/7138-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2024-46955
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2rj-x3d7-ryd2
11
url VCID-k837-n44h-pkbm
vulnerability_id VCID-k837-n44h-pkbm
summary Artifex Ghostscript: Artifex Ghostscript: Denial of Service via crafted document processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59800.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59800
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04372
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04406
published_at 2026-04-07T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04396
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04441
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04459
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04451
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04436
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04419
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04387
published_at 2026-04-16T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04958
published_at 2026-04-18T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05106
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59800
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397226
reference_id 2397226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397226
5
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=176cf0188a2294bc307b8caec876f39412e58350
reference_id ?id=176cf0188a2294bc307b8caec876f39412e58350
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:52:31Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=176cf0188a2294bc307b8caec876f39412e58350
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708602
reference_id show_bug.cgi?id=708602
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:52:31Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708602
7
reference_url https://usn.ubuntu.com/7782-1/
reference_id USN-7782-1
reference_type
scores
url https://usn.ubuntu.com/7782-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2
aliases CVE-2025-59800
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k837-n44h-pkbm
12
url VCID-pnwf-fw4h-r3g3
vulnerability_id VCID-pnwf-fw4h-r3g3
summary A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-7462
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22684
published_at 2026-04-04T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22641
published_at 2026-04-02T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24272
published_at 2026-04-21T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24262
published_at 2026-04-07T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24329
published_at 2026-04-08T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24373
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2439
published_at 2026-04-11T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24348
published_at 2026-04-12T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24291
published_at 2026-04-13T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24308
published_at 2026-04-16T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24296
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-7462
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7462
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109270
reference_id 1109270
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109270
3
reference_url https://artifex.com/
reference_id artifex.com
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
3
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/
url https://artifex.com/
4
reference_url https://vuldb.com/?ctiid.316113
reference_id ?ctiid.316113
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
3
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/
url https://vuldb.com/?ctiid.316113
5
reference_url https://vuldb.com/?id.316113
reference_id ?id.316113
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
3
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/
url https://vuldb.com/?id.316113
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4
reference_id ?id=619a106ba4c4
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
3
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4
7
reference_url https://vuldb.com/?submit.610173
reference_id ?submit.610173
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
3
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/
url https://vuldb.com/?submit.610173
8
reference_url https://usn.ubuntu.com/7782-1/
reference_id USN-7782-1
reference_type
scores
url https://usn.ubuntu.com/7782-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2025-7462
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnwf-fw4h-r3g3
13
url VCID-pvfx-6ymq-6qbf
vulnerability_id VCID-pvfx-6ymq-6qbf
summary Artifex Ghostscript: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59799.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59799
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03607
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03631
published_at 2026-04-07T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03622
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03632
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03654
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03611
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03583
published_at 2026-04-12T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03558
published_at 2026-04-13T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03532
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04147
published_at 2026-04-18T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04272
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59799
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116443
reference_id 1116443
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116443
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397227
reference_id 2397227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397227
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781
reference_id ?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:48:50Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781
7
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708517
reference_id show_bug.cgi?id=708517
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:48:50Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708517
8
reference_url https://usn.ubuntu.com/7782-1/
reference_id USN-7782-1
reference_type
scores
url https://usn.ubuntu.com/7782-1/
9
reference_url https://usn.ubuntu.com/7904-1/
reference_id USN-7904-1
reference_type
scores
url https://usn.ubuntu.com/7904-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2025-59799
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pvfx-6ymq-6qbf
14
url VCID-rdmp-hfbg-2kh5
vulnerability_id VCID-rdmp-hfbg-2kh5
summary Ghostscript: Ghostscript Argument Sanitization Vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48708.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48708.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-48708
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.0681
published_at 2026-04-21T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06747
published_at 2026-04-09T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06746
published_at 2026-04-11T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06739
published_at 2026-04-12T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06732
published_at 2026-04-13T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06662
published_at 2026-04-16T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06653
published_at 2026-04-18T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06633
published_at 2026-04-02T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06678
published_at 2026-04-04T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06664
published_at 2026-04-07T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06713
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-48708
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48708
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2368134
reference_id 2368134
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2368134
5
reference_url https://security.archlinux.org/ASA-202505-15
reference_id ASA-202505-15
reference_type
scores
url https://security.archlinux.org/ASA-202505-15
6
reference_url https://security.archlinux.org/AVG-2883
reference_id AVG-2883
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2883
7
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b587663c623b4462f9e78686a31fd880207303ee
reference_id ?id=b587663c623b4462f9e78686a31fd880207303ee
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-23T13:21:22Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b587663c623b4462f9e78686a31fd880207303ee
8
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708446
reference_id show_bug.cgi?id=708446
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-23T13:21:22Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708446
9
reference_url https://usn.ubuntu.com/7623-1/
reference_id USN-7623-1
reference_type
scores
url https://usn.ubuntu.com/7623-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1
aliases CVE-2025-48708
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rdmp-hfbg-2kh5
15
url VCID-t3n4-wrgr-bkdy
vulnerability_id VCID-t3n4-wrgr-bkdy
summary ghostscript: ghostscript: arbitrary file read/write through Tesseract configuration
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29511.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29511
reference_id
reference_type
scores
0
value 0.00781
scoring_system epss
scoring_elements 0.73744
published_at 2026-04-18T12:55:00Z
1
value 0.00781
scoring_system epss
scoring_elements 0.7365
published_at 2026-04-07T12:55:00Z
2
value 0.00781
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-08T12:55:00Z
3
value 0.00781
scoring_system epss
scoring_elements 0.73698
published_at 2026-04-09T12:55:00Z
4
value 0.00781
scoring_system epss
scoring_elements 0.73719
published_at 2026-04-11T12:55:00Z
5
value 0.00781
scoring_system epss
scoring_elements 0.73701
published_at 2026-04-12T12:55:00Z
6
value 0.00781
scoring_system epss
scoring_elements 0.73692
published_at 2026-04-13T12:55:00Z
7
value 0.00781
scoring_system epss
scoring_elements 0.73736
published_at 2026-04-21T12:55:00Z
8
value 0.00781
scoring_system epss
scoring_elements 0.73653
published_at 2026-04-02T12:55:00Z
9
value 0.00781
scoring_system epss
scoring_elements 0.73677
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29511
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295648
reference_id 2295648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295648
5
reference_url https://www.openwall.com/lists/oss-security/2024/07/03/7
reference_id 7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/
url https://www.openwall.com/lists/oss-security/2024/07/03/7
6
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44
reference_id ?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44
7
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707510
reference_id show_bug.cgi?id=707510
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707510
8
reference_url https://usn.ubuntu.com/6897-1/
reference_id USN-6897-1
reference_type
scores
url https://usn.ubuntu.com/6897-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1
aliases CVE-2024-29511
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t3n4-wrgr-bkdy
16
url VCID-wtv2-9jx7-kkgz
vulnerability_id VCID-wtv2-9jx7-kkgz
summary ghostscript: heap pointer leak in pdf_base_font_alloc()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29508.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29508
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10157
published_at 2026-04-21T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10137
published_at 2026-04-08T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10198
published_at 2026-04-09T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10235
published_at 2026-04-11T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10195
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10176
published_at 2026-04-13T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.1005
published_at 2026-04-16T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10026
published_at 2026-04-18T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.10104
published_at 2026-04-02T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10166
published_at 2026-04-04T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.10061
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29508
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295627
reference_id 2295627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295627
5
reference_url https://www.openwall.com/lists/oss-security/2024/07/03/7
reference_id 7
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/
url https://www.openwall.com/lists/oss-security/2024/07/03/7
6
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a
reference_id ?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a
7
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707510
reference_id show_bug.cgi?id=707510
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707510
8
reference_url https://usn.ubuntu.com/6897-1/
reference_id USN-6897-1
reference_type
scores
url https://usn.ubuntu.com/6897-1/
9
reference_url https://usn.ubuntu.com/7623-1/
reference_id USN-7623-1
reference_type
scores
url https://usn.ubuntu.com/7623-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2024-29508
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wtv2-9jx7-kkgz
17
url VCID-wzad-uxqp-63h3
vulnerability_id VCID-wzad-uxqp-63h3
summary In Artifex GhostXPS before 10.06.0, there is a stack-based buffer overflow in xps_unpredict_tiff in xpstiff.c because the samplesperpixel value is not checked.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59801
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03953
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03987
published_at 2026-04-08T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04005
published_at 2026-04-09T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03975
published_at 2026-04-11T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03958
published_at 2026-04-12T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03929
published_at 2026-04-13T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.0391
published_at 2026-04-16T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03968
published_at 2026-04-04T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0398
published_at 2026-04-07T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04495
published_at 2026-04-18T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04631
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59801
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59801
2
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=99727069197d548a8db69ba5d63f766bff40eaab
reference_id ?id=99727069197d548a8db69ba5d63f766bff40eaab
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:53:38Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=99727069197d548a8db69ba5d63f766bff40eaab
3
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708819
reference_id show_bug.cgi?id=708819
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:53:38Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708819
fixed_packages
0
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2
aliases CVE-2025-59801
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wzad-uxqp-63h3
18
url VCID-x5ce-v7bc-ufam
vulnerability_id VCID-x5ce-v7bc-ufam
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27836.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27836
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43371
published_at 2026-04-02T12:55:00Z
1
value 0.0021
scoring_system epss
scoring_elements 0.43357
published_at 2026-04-21T12:55:00Z
2
value 0.0021
scoring_system epss
scoring_elements 0.43376
published_at 2026-04-13T12:55:00Z
3
value 0.0021
scoring_system epss
scoring_elements 0.43434
published_at 2026-04-16T12:55:00Z
4
value 0.0021
scoring_system epss
scoring_elements 0.43423
published_at 2026-04-18T12:55:00Z
5
value 0.0021
scoring_system epss
scoring_elements 0.43399
published_at 2026-04-04T12:55:00Z
6
value 0.0021
scoring_system epss
scoring_elements 0.43337
published_at 2026-04-07T12:55:00Z
7
value 0.0021
scoring_system epss
scoring_elements 0.43389
published_at 2026-04-08T12:55:00Z
8
value 0.0021
scoring_system epss
scoring_elements 0.43403
published_at 2026-04-09T12:55:00Z
9
value 0.0021
scoring_system epss
scoring_elements 0.43422
published_at 2026-04-11T12:55:00Z
10
value 0.0021
scoring_system epss
scoring_elements 0.43391
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27836
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354952
reference_id 2354952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354952
5
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708192
reference_id show_bug.cgi?id=708192
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:18:16Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708192
7
reference_url https://usn.ubuntu.com/7378-1/
reference_id USN-7378-1
reference_type
scores
url https://usn.ubuntu.com/7378-1/
8
reference_url https://usn.ubuntu.com/7623-1/
reference_id USN-7623-1
reference_type
scores
url https://usn.ubuntu.com/7623-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8
aliases CVE-2025-27836
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5ce-v7bc-ufam
Fixing_vulnerabilities
0
url VCID-16fp-tdk6-sfcc
vulnerability_id VCID-16fp-tdk6-sfcc
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33869.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33869
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02785
published_at 2026-04-21T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-04-11T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02685
published_at 2026-04-12T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02682
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02663
published_at 2026-04-16T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02671
published_at 2026-04-18T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02684
published_at 2026-04-02T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02698
published_at 2026-04-04T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02705
published_at 2026-04-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02708
published_at 2026-04-08T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02728
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33869
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.openwall.com/lists/oss-security/2024/06/28/2
reference_id 2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T20:27:59Z/
url https://www.openwall.com/lists/oss-security/2024/06/28/2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293958
reference_id 2293958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293958
10
reference_url https://security.gentoo.org/glsa/202409-03
reference_id GLSA-202409-03
reference_type
scores
url https://security.gentoo.org/glsa/202409-03
11
reference_url https://access.redhat.com/errata/RHSA-2024:6197
reference_id RHSA-2024:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6197
12
reference_url https://access.redhat.com/errata/RHSA-2024:6466
reference_id RHSA-2024:6466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6466
13
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707691
reference_id show_bug.cgi?id=707691
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T20:27:59Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707691
14
reference_url https://usn.ubuntu.com/6835-1/
reference_id USN-6835-1
reference_type
scores
url https://usn.ubuntu.com/6835-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2024-33869
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16fp-tdk6-sfcc
1
url VCID-1xn6-drde-gkd4
vulnerability_id VCID-1xn6-drde-gkd4
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14812.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14812
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67658
published_at 2026-04-01T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67764
published_at 2026-04-21T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67734
published_at 2026-04-13T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67771
published_at 2026-04-16T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67693
published_at 2026-04-07T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67713
published_at 2026-04-04T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67744
published_at 2026-04-08T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67758
published_at 2026-04-09T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67782
published_at 2026-04-18T12:55:00Z
9
value 0.00543
scoring_system epss
scoring_elements 0.67768
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743754
reference_id 1743754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743754
8
reference_url https://security.archlinux.org/ASA-201911-5
reference_id ASA-201911-5
reference_type
scores
url https://security.archlinux.org/ASA-201911-5
9
reference_url https://security.archlinux.org/AVG-1031
reference_id AVG-1031
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1031
10
reference_url https://security.gentoo.org/glsa/202004-03
reference_id GLSA-202004-03
reference_type
scores
url https://security.gentoo.org/glsa/202004-03
11
reference_url https://access.redhat.com/errata/RHSA-2019:2534
reference_id RHSA-2019:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2534
12
reference_url https://access.redhat.com/errata/RHSA-2019:2586
reference_id RHSA-2019:2586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2586
13
reference_url https://access.redhat.com/errata/RHSA-2019:2591
reference_id RHSA-2019:2591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2591
14
reference_url https://usn.ubuntu.com/4111-1/
reference_id USN-4111-1
reference_type
scores
url https://usn.ubuntu.com/4111-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
purl pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-2ypb-qhkv-1yfe
4
vulnerability VCID-3gax-xvqu-ykhh
5
vulnerability VCID-3sxw-86yd-gqe1
6
vulnerability VCID-479g-vu9e-1ygz
7
vulnerability VCID-4eac-yk5k-mueh
8
vulnerability VCID-4grr-m9cp-x3fm
9
vulnerability VCID-4h4k-fmtp-j7bg
10
vulnerability VCID-4zba-5tgb-nufd
11
vulnerability VCID-6zft-uqxb-pkh2
12
vulnerability VCID-79q2-phm8-e7cv
13
vulnerability VCID-7anb-rnxg-97h8
14
vulnerability VCID-7ap3-6gs2-fbgs
15
vulnerability VCID-7u9a-5pkt-4fbf
16
vulnerability VCID-8hfa-4qua-tuab
17
vulnerability VCID-8wed-eqxt-pygs
18
vulnerability VCID-8wfs-knnp-8ub1
19
vulnerability VCID-95yj-ph8u-2fbq
20
vulnerability VCID-ae31-n66y-akcg
21
vulnerability VCID-b1zp-sfch-u3c1
22
vulnerability VCID-barv-t623-h3e5
23
vulnerability VCID-bnpf-udu2-hqbk
24
vulnerability VCID-c6ms-5wr2-kbfj
25
vulnerability VCID-e8bh-th45-vfgg
26
vulnerability VCID-eqhh-t7qd-vuav
27
vulnerability VCID-eypv-n5ea-abgn
28
vulnerability VCID-fehm-g4fq-pfb2
29
vulnerability VCID-ge8e-fm7t-gqgj
30
vulnerability VCID-gjj2-k1mt-sbgv
31
vulnerability VCID-gv9z-e7t9-m7g6
32
vulnerability VCID-h7py-se4n-6bdy
33
vulnerability VCID-hc8b-qzqp-pqdn
34
vulnerability VCID-ht37-jj18-t3c5
35
vulnerability VCID-hy2v-rkzm-nka1
36
vulnerability VCID-k2rj-x3d7-ryd2
37
vulnerability VCID-kd8x-74zr-e7dd
38
vulnerability VCID-kjpt-6dws-9ufd
39
vulnerability VCID-kk8v-381v-sybr
40
vulnerability VCID-kw3r-f2mb-cyf6
41
vulnerability VCID-mg71-sbsj-2yam
42
vulnerability VCID-mqgf-gbdy-4uav
43
vulnerability VCID-mr6f-95kb-wfhf
44
vulnerability VCID-n8rh-znkz-tfdt
45
vulnerability VCID-nhtp-m11f-xuh6
46
vulnerability VCID-nsan-3rne-7fbw
47
vulnerability VCID-pjph-6muk-aff3
48
vulnerability VCID-pnwf-fw4h-r3g3
49
vulnerability VCID-pvfx-6ymq-6qbf
50
vulnerability VCID-q9by-9s2x-z3au
51
vulnerability VCID-qvq2-xbp6-m3fy
52
vulnerability VCID-s9t8-smvb-wkd4
53
vulnerability VCID-sj4u-xzg3-z3hf
54
vulnerability VCID-snzm-pkb8-9fcp
55
vulnerability VCID-thz5-yhwy-63fc
56
vulnerability VCID-tp6u-sxuv-a3a6
57
vulnerability VCID-trcm-319g-5qhu
58
vulnerability VCID-ue85-9uqn-xye4
59
vulnerability VCID-uryu-n1p2-mugy
60
vulnerability VCID-vkxy-8vep-x7bg
61
vulnerability VCID-vw3z-bxb8-qkdq
62
vulnerability VCID-wtv2-9jx7-kkgz
63
vulnerability VCID-x5ce-v7bc-ufam
64
vulnerability VCID-x6p8-v4bm-nqhs
65
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6
1
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
2
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2019-14812
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xn6-drde-gkd4
2
url VCID-2ncr-54s7-hqfz
vulnerability_id VCID-2ncr-54s7-hqfz
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36664.json
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-36664
reference_id
reference_type
scores
0
value 0.06431
scoring_system epss
scoring_elements 0.91014
published_at 2026-04-02T12:55:00Z
1
value 0.06431
scoring_system epss
scoring_elements 0.91085
published_at 2026-04-21T12:55:00Z
2
value 0.06431
scoring_system epss
scoring_elements 0.91022
published_at 2026-04-04T12:55:00Z
3
value 0.06431
scoring_system epss
scoring_elements 0.91032
published_at 2026-04-07T12:55:00Z
4
value 0.06431
scoring_system epss
scoring_elements 0.91045
published_at 2026-04-08T12:55:00Z
5
value 0.06431
scoring_system epss
scoring_elements 0.91051
published_at 2026-04-09T12:55:00Z
6
value 0.06431
scoring_system epss
scoring_elements 0.9106
published_at 2026-04-12T12:55:00Z
7
value 0.06431
scoring_system epss
scoring_elements 0.91059
published_at 2026-04-13T12:55:00Z
8
value 0.06431
scoring_system epss
scoring_elements 0.91084
published_at 2026-04-16T12:55:00Z
9
value 0.06431
scoring_system epss
scoring_elements 0.91083
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-36664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2217798
reference_id 2217798
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2217798
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/
reference_id 2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/
reference_id 5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/
7
reference_url https://www.debian.org/security/2023/dsa-5446
reference_id dsa-5446
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/
url https://www.debian.org/security/2023/dsa-5446
8
reference_url https://security.gentoo.org/glsa/202309-03
reference_id GLSA-202309-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/
url https://security.gentoo.org/glsa/202309-03
9
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d
reference_id ?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d
10
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c
reference_id ?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c
11
reference_url https://access.redhat.com/errata/RHSA-2023:4324
reference_id RHSA-2023:4324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4324
12
reference_url https://access.redhat.com/errata/RHSA-2023:5459
reference_id RHSA-2023:5459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5459
13
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=706761
reference_id show_bug.cgi?id=706761
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=706761
14
reference_url https://usn.ubuntu.com/6213-1/
reference_id USN-6213-1
reference_type
scores
url https://usn.ubuntu.com/6213-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2023-36664
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ncr-54s7-hqfz
3
url VCID-3gax-xvqu-ykhh
vulnerability_id VCID-3gax-xvqu-ykhh
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52722.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52722
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.1805
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17867
published_at 2026-04-21T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17971
published_at 2026-04-11T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17926
published_at 2026-04-12T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17877
published_at 2026-04-13T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.1782
published_at 2026-04-16T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17829
published_at 2026-04-18T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.18104
published_at 2026-04-04T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17807
published_at 2026-04-07T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17894
published_at 2026-04-08T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17955
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.openwall.com/lists/oss-security/2024/06/28/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T19:14:51Z/
url http://www.openwall.com/lists/oss-security/2024/06/28/2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2278775
reference_id 2278775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2278775
10
reference_url https://security.gentoo.org/glsa/202409-03
reference_id GLSA-202409-03
reference_type
scores
url https://security.gentoo.org/glsa/202409-03
11
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1
reference_id ?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T19:14:51Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1
12
reference_url https://usn.ubuntu.com/6835-1/
reference_id USN-6835-1
reference_type
scores
url https://usn.ubuntu.com/6835-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2023-52722
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gax-xvqu-ykhh
4
url VCID-3sxw-86yd-gqe1
vulnerability_id VCID-3sxw-86yd-gqe1
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10216.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10216
reference_id
reference_type
scores
0
value 0.00526
scoring_system epss
scoring_elements 0.66942
published_at 2026-04-01T12:55:00Z
1
value 0.00526
scoring_system epss
scoring_elements 0.6698
published_at 2026-04-02T12:55:00Z
2
value 0.00526
scoring_system epss
scoring_elements 0.67005
published_at 2026-04-04T12:55:00Z
3
value 0.00526
scoring_system epss
scoring_elements 0.66978
published_at 2026-04-07T12:55:00Z
4
value 0.00526
scoring_system epss
scoring_elements 0.67028
published_at 2026-04-08T12:55:00Z
5
value 0.00526
scoring_system epss
scoring_elements 0.67041
published_at 2026-04-09T12:55:00Z
6
value 0.00526
scoring_system epss
scoring_elements 0.6706
published_at 2026-04-11T12:55:00Z
7
value 0.00526
scoring_system epss
scoring_elements 0.67046
published_at 2026-04-12T12:55:00Z
8
value 0.00526
scoring_system epss
scoring_elements 0.67015
published_at 2026-04-13T12:55:00Z
9
value 0.00526
scoring_system epss
scoring_elements 0.67047
published_at 2026-04-16T12:55:00Z
10
value 0.00526
scoring_system epss
scoring_elements 0.67062
published_at 2026-04-18T12:55:00Z
11
value 0.00526
scoring_system epss
scoring_elements 0.67043
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1737080
reference_id 1737080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1737080
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934638
reference_id 934638
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934638
6
reference_url https://security.gentoo.org/glsa/202004-03
reference_id GLSA-202004-03
reference_type
scores
url https://security.gentoo.org/glsa/202004-03
7
reference_url https://access.redhat.com/errata/RHSA-2019:2462
reference_id RHSA-2019:2462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2462
8
reference_url https://access.redhat.com/errata/RHSA-2019:2465
reference_id RHSA-2019:2465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2465
9
reference_url https://access.redhat.com/errata/RHSA-2019:2534
reference_id RHSA-2019:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2534
10
reference_url https://usn.ubuntu.com/4092-1/
reference_id USN-4092-1
reference_type
scores
url https://usn.ubuntu.com/4092-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
purl pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-2ypb-qhkv-1yfe
4
vulnerability VCID-3gax-xvqu-ykhh
5
vulnerability VCID-3sxw-86yd-gqe1
6
vulnerability VCID-479g-vu9e-1ygz
7
vulnerability VCID-4eac-yk5k-mueh
8
vulnerability VCID-4grr-m9cp-x3fm
9
vulnerability VCID-4h4k-fmtp-j7bg
10
vulnerability VCID-4zba-5tgb-nufd
11
vulnerability VCID-6zft-uqxb-pkh2
12
vulnerability VCID-79q2-phm8-e7cv
13
vulnerability VCID-7anb-rnxg-97h8
14
vulnerability VCID-7ap3-6gs2-fbgs
15
vulnerability VCID-7u9a-5pkt-4fbf
16
vulnerability VCID-8hfa-4qua-tuab
17
vulnerability VCID-8wed-eqxt-pygs
18
vulnerability VCID-8wfs-knnp-8ub1
19
vulnerability VCID-95yj-ph8u-2fbq
20
vulnerability VCID-ae31-n66y-akcg
21
vulnerability VCID-b1zp-sfch-u3c1
22
vulnerability VCID-barv-t623-h3e5
23
vulnerability VCID-bnpf-udu2-hqbk
24
vulnerability VCID-c6ms-5wr2-kbfj
25
vulnerability VCID-e8bh-th45-vfgg
26
vulnerability VCID-eqhh-t7qd-vuav
27
vulnerability VCID-eypv-n5ea-abgn
28
vulnerability VCID-fehm-g4fq-pfb2
29
vulnerability VCID-ge8e-fm7t-gqgj
30
vulnerability VCID-gjj2-k1mt-sbgv
31
vulnerability VCID-gv9z-e7t9-m7g6
32
vulnerability VCID-h7py-se4n-6bdy
33
vulnerability VCID-hc8b-qzqp-pqdn
34
vulnerability VCID-ht37-jj18-t3c5
35
vulnerability VCID-hy2v-rkzm-nka1
36
vulnerability VCID-k2rj-x3d7-ryd2
37
vulnerability VCID-kd8x-74zr-e7dd
38
vulnerability VCID-kjpt-6dws-9ufd
39
vulnerability VCID-kk8v-381v-sybr
40
vulnerability VCID-kw3r-f2mb-cyf6
41
vulnerability VCID-mg71-sbsj-2yam
42
vulnerability VCID-mqgf-gbdy-4uav
43
vulnerability VCID-mr6f-95kb-wfhf
44
vulnerability VCID-n8rh-znkz-tfdt
45
vulnerability VCID-nhtp-m11f-xuh6
46
vulnerability VCID-nsan-3rne-7fbw
47
vulnerability VCID-pjph-6muk-aff3
48
vulnerability VCID-pnwf-fw4h-r3g3
49
vulnerability VCID-pvfx-6ymq-6qbf
50
vulnerability VCID-q9by-9s2x-z3au
51
vulnerability VCID-qvq2-xbp6-m3fy
52
vulnerability VCID-s9t8-smvb-wkd4
53
vulnerability VCID-sj4u-xzg3-z3hf
54
vulnerability VCID-snzm-pkb8-9fcp
55
vulnerability VCID-thz5-yhwy-63fc
56
vulnerability VCID-tp6u-sxuv-a3a6
57
vulnerability VCID-trcm-319g-5qhu
58
vulnerability VCID-ue85-9uqn-xye4
59
vulnerability VCID-uryu-n1p2-mugy
60
vulnerability VCID-vkxy-8vep-x7bg
61
vulnerability VCID-vw3z-bxb8-qkdq
62
vulnerability VCID-wtv2-9jx7-kkgz
63
vulnerability VCID-x5ce-v7bc-ufam
64
vulnerability VCID-x6p8-v4bm-nqhs
65
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6
1
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
2
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2019-10216
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3sxw-86yd-gqe1
5
url VCID-479g-vu9e-1ygz
vulnerability_id VCID-479g-vu9e-1ygz
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
2
reference_url https://access.redhat.com/errata/RHBA-2019:2824
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:2824
3
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2594
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14811.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14811.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14811
reference_id
reference_type
scores
0
value 0.01726
scoring_system epss
scoring_elements 0.82354
published_at 2026-04-01T12:55:00Z
1
value 0.01726
scoring_system epss
scoring_elements 0.82468
published_at 2026-04-21T12:55:00Z
2
value 0.01726
scoring_system epss
scoring_elements 0.82436
published_at 2026-04-11T12:55:00Z
3
value 0.01726
scoring_system epss
scoring_elements 0.82432
published_at 2026-04-12T12:55:00Z
4
value 0.01726
scoring_system epss
scoring_elements 0.82427
published_at 2026-04-13T12:55:00Z
5
value 0.01726
scoring_system epss
scoring_elements 0.82462
published_at 2026-04-16T12:55:00Z
6
value 0.01726
scoring_system epss
scoring_elements 0.82464
published_at 2026-04-18T12:55:00Z
7
value 0.01726
scoring_system epss
scoring_elements 0.82368
published_at 2026-04-02T12:55:00Z
8
value 0.01726
scoring_system epss
scoring_elements 0.82386
published_at 2026-04-04T12:55:00Z
9
value 0.01726
scoring_system epss
scoring_elements 0.82382
published_at 2026-04-07T12:55:00Z
10
value 0.01726
scoring_system epss
scoring_elements 0.8241
published_at 2026-04-08T12:55:00Z
11
value 0.01726
scoring_system epss
scoring_elements 0.82417
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14811
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
16
reference_url https://seclists.org/bugtraq/2019/Sep/15
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/15
17
reference_url https://www.debian.org/security/2019/dsa-4518
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4518
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743757
reference_id 1743757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743757
19
reference_url https://security.archlinux.org/ASA-201911-5
reference_id ASA-201911-5
reference_type
scores
url https://security.archlinux.org/ASA-201911-5
20
reference_url https://security.archlinux.org/AVG-1031
reference_id AVG-1031
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1031
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14811
reference_id CVE-2019-14811
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14811
33
reference_url https://security.gentoo.org/glsa/202004-03
reference_id GLSA-202004-03
reference_type
scores
url https://security.gentoo.org/glsa/202004-03
34
reference_url https://access.redhat.com/errata/RHSA-2019:2534
reference_id RHSA-2019:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2534
35
reference_url https://access.redhat.com/errata/RHSA-2019:2586
reference_id RHSA-2019:2586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2586
36
reference_url https://access.redhat.com/errata/RHSA-2019:2591
reference_id RHSA-2019:2591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2591
37
reference_url https://usn.ubuntu.com/4111-1/
reference_id USN-4111-1
reference_type
scores
url https://usn.ubuntu.com/4111-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
purl pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-2ypb-qhkv-1yfe
4
vulnerability VCID-3gax-xvqu-ykhh
5
vulnerability VCID-3sxw-86yd-gqe1
6
vulnerability VCID-479g-vu9e-1ygz
7
vulnerability VCID-4eac-yk5k-mueh
8
vulnerability VCID-4grr-m9cp-x3fm
9
vulnerability VCID-4h4k-fmtp-j7bg
10
vulnerability VCID-4zba-5tgb-nufd
11
vulnerability VCID-6zft-uqxb-pkh2
12
vulnerability VCID-79q2-phm8-e7cv
13
vulnerability VCID-7anb-rnxg-97h8
14
vulnerability VCID-7ap3-6gs2-fbgs
15
vulnerability VCID-7u9a-5pkt-4fbf
16
vulnerability VCID-8hfa-4qua-tuab
17
vulnerability VCID-8wed-eqxt-pygs
18
vulnerability VCID-8wfs-knnp-8ub1
19
vulnerability VCID-95yj-ph8u-2fbq
20
vulnerability VCID-ae31-n66y-akcg
21
vulnerability VCID-b1zp-sfch-u3c1
22
vulnerability VCID-barv-t623-h3e5
23
vulnerability VCID-bnpf-udu2-hqbk
24
vulnerability VCID-c6ms-5wr2-kbfj
25
vulnerability VCID-e8bh-th45-vfgg
26
vulnerability VCID-eqhh-t7qd-vuav
27
vulnerability VCID-eypv-n5ea-abgn
28
vulnerability VCID-fehm-g4fq-pfb2
29
vulnerability VCID-ge8e-fm7t-gqgj
30
vulnerability VCID-gjj2-k1mt-sbgv
31
vulnerability VCID-gv9z-e7t9-m7g6
32
vulnerability VCID-h7py-se4n-6bdy
33
vulnerability VCID-hc8b-qzqp-pqdn
34
vulnerability VCID-ht37-jj18-t3c5
35
vulnerability VCID-hy2v-rkzm-nka1
36
vulnerability VCID-k2rj-x3d7-ryd2
37
vulnerability VCID-kd8x-74zr-e7dd
38
vulnerability VCID-kjpt-6dws-9ufd
39
vulnerability VCID-kk8v-381v-sybr
40
vulnerability VCID-kw3r-f2mb-cyf6
41
vulnerability VCID-mg71-sbsj-2yam
42
vulnerability VCID-mqgf-gbdy-4uav
43
vulnerability VCID-mr6f-95kb-wfhf
44
vulnerability VCID-n8rh-znkz-tfdt
45
vulnerability VCID-nhtp-m11f-xuh6
46
vulnerability VCID-nsan-3rne-7fbw
47
vulnerability VCID-pjph-6muk-aff3
48
vulnerability VCID-pnwf-fw4h-r3g3
49
vulnerability VCID-pvfx-6ymq-6qbf
50
vulnerability VCID-q9by-9s2x-z3au
51
vulnerability VCID-qvq2-xbp6-m3fy
52
vulnerability VCID-s9t8-smvb-wkd4
53
vulnerability VCID-sj4u-xzg3-z3hf
54
vulnerability VCID-snzm-pkb8-9fcp
55
vulnerability VCID-thz5-yhwy-63fc
56
vulnerability VCID-tp6u-sxuv-a3a6
57
vulnerability VCID-trcm-319g-5qhu
58
vulnerability VCID-ue85-9uqn-xye4
59
vulnerability VCID-uryu-n1p2-mugy
60
vulnerability VCID-vkxy-8vep-x7bg
61
vulnerability VCID-vw3z-bxb8-qkdq
62
vulnerability VCID-wtv2-9jx7-kkgz
63
vulnerability VCID-x5ce-v7bc-ufam
64
vulnerability VCID-x6p8-v4bm-nqhs
65
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6
1
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
2
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2019-14811
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-479g-vu9e-1ygz
6
url VCID-4eac-yk5k-mueh
vulnerability_id VCID-4eac-yk5k-mueh
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16307.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16307.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16307
reference_id
reference_type
scores
0
value 0.01771
scoring_system epss
scoring_elements 0.82582
published_at 2026-04-01T12:55:00Z
1
value 0.01771
scoring_system epss
scoring_elements 0.82597
published_at 2026-04-02T12:55:00Z
2
value 0.01771
scoring_system epss
scoring_elements 0.82612
published_at 2026-04-04T12:55:00Z
3
value 0.01771
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-07T12:55:00Z
4
value 0.01771
scoring_system epss
scoring_elements 0.82634
published_at 2026-04-08T12:55:00Z
5
value 0.01771
scoring_system epss
scoring_elements 0.82642
published_at 2026-04-09T12:55:00Z
6
value 0.01771
scoring_system epss
scoring_elements 0.82659
published_at 2026-04-11T12:55:00Z
7
value 0.01771
scoring_system epss
scoring_elements 0.82654
published_at 2026-04-12T12:55:00Z
8
value 0.01771
scoring_system epss
scoring_elements 0.82649
published_at 2026-04-13T12:55:00Z
9
value 0.01771
scoring_system epss
scoring_elements 0.82686
published_at 2026-04-16T12:55:00Z
10
value 0.01771
scoring_system epss
scoring_elements 0.82687
published_at 2026-04-18T12:55:00Z
11
value 0.01771
scoring_system epss
scoring_elements 0.8269
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16307
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870162
reference_id 1870162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870162
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16307
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4eac-yk5k-mueh
7
url VCID-4grr-m9cp-x3fm
vulnerability_id VCID-4grr-m9cp-x3fm
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16298.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16298.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16298
reference_id
reference_type
scores
0
value 0.01421
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-01T12:55:00Z
1
value 0.01421
scoring_system epss
scoring_elements 0.80541
published_at 2026-04-02T12:55:00Z
2
value 0.01421
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-04T12:55:00Z
3
value 0.01421
scoring_system epss
scoring_elements 0.80556
published_at 2026-04-07T12:55:00Z
4
value 0.01421
scoring_system epss
scoring_elements 0.80585
published_at 2026-04-08T12:55:00Z
5
value 0.01421
scoring_system epss
scoring_elements 0.80594
published_at 2026-04-09T12:55:00Z
6
value 0.01421
scoring_system epss
scoring_elements 0.80611
published_at 2026-04-11T12:55:00Z
7
value 0.01421
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-12T12:55:00Z
8
value 0.01421
scoring_system epss
scoring_elements 0.8059
published_at 2026-04-13T12:55:00Z
9
value 0.01421
scoring_system epss
scoring_elements 0.80619
published_at 2026-04-16T12:55:00Z
10
value 0.01421
scoring_system epss
scoring_elements 0.80622
published_at 2026-04-18T12:55:00Z
11
value 0.01421
scoring_system epss
scoring_elements 0.80625
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16298
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870152
reference_id 1870152
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870152
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16298
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4grr-m9cp-x3fm
8
url VCID-4h4k-fmtp-j7bg
vulnerability_id VCID-4h4k-fmtp-j7bg
summary ghostscript: Divide by zero in eps_print_page in gdevepsn.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21710.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-21710
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59058
published_at 2026-04-01T12:55:00Z
1
value 0.00375
scoring_system epss
scoring_elements 0.5913
published_at 2026-04-02T12:55:00Z
2
value 0.00375
scoring_system epss
scoring_elements 0.59185
published_at 2026-04-21T12:55:00Z
3
value 0.00375
scoring_system epss
scoring_elements 0.59184
published_at 2026-04-12T12:55:00Z
4
value 0.00375
scoring_system epss
scoring_elements 0.59165
published_at 2026-04-13T12:55:00Z
5
value 0.00375
scoring_system epss
scoring_elements 0.59201
published_at 2026-04-16T12:55:00Z
6
value 0.00375
scoring_system epss
scoring_elements 0.59206
published_at 2026-04-18T12:55:00Z
7
value 0.00375
scoring_system epss
scoring_elements 0.59154
published_at 2026-04-04T12:55:00Z
8
value 0.00375
scoring_system epss
scoring_elements 0.59118
published_at 2026-04-07T12:55:00Z
9
value 0.00375
scoring_system epss
scoring_elements 0.59169
published_at 2026-04-08T12:55:00Z
10
value 0.00375
scoring_system epss
scoring_elements 0.59182
published_at 2026-04-09T12:55:00Z
11
value 0.00375
scoring_system epss
scoring_elements 0.59202
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-21710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21710
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235001
reference_id 2235001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235001
5
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html
6
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925
reference_id ?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925
7
reference_url https://access.redhat.com/errata/RHSA-2024:2966
reference_id RHSA-2024:2966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2966
8
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=701843
reference_id show_bug.cgi?id=701843
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=701843
9
reference_url https://usn.ubuntu.com/6364-1/
reference_id USN-6364-1
reference_type
scores
url https://usn.ubuntu.com/6364-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-21710
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4h4k-fmtp-j7bg
9
url VCID-4zba-5tgb-nufd
vulnerability_id VCID-4zba-5tgb-nufd
summary Ghostscript: out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36773.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36773
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28704
published_at 2026-04-01T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28786
published_at 2026-04-02T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28604
published_at 2026-04-21T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28835
published_at 2026-04-04T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.2864
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28706
published_at 2026-04-08T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28745
published_at 2026-04-09T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28749
published_at 2026-04-11T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28705
published_at 2026-04-12T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28656
published_at 2026-04-13T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28676
published_at 2026-04-16T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28652
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36773
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36773
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262734
reference_id 2262734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262734
5
reference_url https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/tag/gs9530
reference_id gs9530
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/
url https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/tag/gs9530
6
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874
reference_id ?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874
7
reference_url https://bugzilla.opensuse.org/show_bug.cgi?id=1177922
reference_id show_bug.cgi?id=1177922
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/
url https://bugzilla.opensuse.org/show_bug.cgi?id=1177922
8
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=702229
reference_id show_bug.cgi?id=702229
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=702229
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-36773
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zba-5tgb-nufd
10
url VCID-79q2-phm8-e7cv
vulnerability_id VCID-79q2-phm8-e7cv
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16295.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16295.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16295
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64327
published_at 2026-04-01T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64381
published_at 2026-04-02T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.6441
published_at 2026-04-04T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.6437
published_at 2026-04-07T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64419
published_at 2026-04-08T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64434
published_at 2026-04-12T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64447
published_at 2026-04-11T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64406
published_at 2026-04-13T12:55:00Z
8
value 0.00467
scoring_system epss
scoring_elements 0.64441
published_at 2026-04-16T12:55:00Z
9
value 0.00467
scoring_system epss
scoring_elements 0.64452
published_at 2026-04-18T12:55:00Z
10
value 0.00467
scoring_system epss
scoring_elements 0.64445
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870179
reference_id 1870179
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870179
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16295
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-79q2-phm8-e7cv
11
url VCID-7ap3-6gs2-fbgs
vulnerability_id VCID-7ap3-6gs2-fbgs
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16297.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16297.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16297
reference_id
reference_type
scores
0
value 0.00432
scoring_system epss
scoring_elements 0.62668
published_at 2026-04-21T12:55:00Z
1
value 0.00432
scoring_system epss
scoring_elements 0.62659
published_at 2026-04-12T12:55:00Z
2
value 0.00432
scoring_system epss
scoring_elements 0.62636
published_at 2026-04-13T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62678
published_at 2026-04-16T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62686
published_at 2026-04-18T12:55:00Z
5
value 0.00564
scoring_system epss
scoring_elements 0.68392
published_at 2026-04-08T12:55:00Z
6
value 0.00564
scoring_system epss
scoring_elements 0.68409
published_at 2026-04-09T12:55:00Z
7
value 0.00564
scoring_system epss
scoring_elements 0.68436
published_at 2026-04-11T12:55:00Z
8
value 0.00564
scoring_system epss
scoring_elements 0.68325
published_at 2026-04-01T12:55:00Z
9
value 0.00564
scoring_system epss
scoring_elements 0.68342
published_at 2026-04-07T12:55:00Z
10
value 0.00564
scoring_system epss
scoring_elements 0.68345
published_at 2026-04-02T12:55:00Z
11
value 0.00564
scoring_system epss
scoring_elements 0.68365
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16297
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870227
reference_id 1870227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870227
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16297
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ap3-6gs2-fbgs
12
url VCID-8wed-eqxt-pygs
vulnerability_id VCID-8wed-eqxt-pygs
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16302.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16302
reference_id
reference_type
scores
0
value 0.00791
scoring_system epss
scoring_elements 0.73839
published_at 2026-04-01T12:55:00Z
1
value 0.00791
scoring_system epss
scoring_elements 0.73849
published_at 2026-04-02T12:55:00Z
2
value 0.00791
scoring_system epss
scoring_elements 0.73875
published_at 2026-04-04T12:55:00Z
3
value 0.00791
scoring_system epss
scoring_elements 0.73846
published_at 2026-04-07T12:55:00Z
4
value 0.00791
scoring_system epss
scoring_elements 0.73881
published_at 2026-04-08T12:55:00Z
5
value 0.00791
scoring_system epss
scoring_elements 0.73894
published_at 2026-04-09T12:55:00Z
6
value 0.00791
scoring_system epss
scoring_elements 0.73916
published_at 2026-04-11T12:55:00Z
7
value 0.00791
scoring_system epss
scoring_elements 0.73897
published_at 2026-04-12T12:55:00Z
8
value 0.00791
scoring_system epss
scoring_elements 0.73889
published_at 2026-04-13T12:55:00Z
9
value 0.00791
scoring_system epss
scoring_elements 0.73931
published_at 2026-04-21T12:55:00Z
10
value 0.00791
scoring_system epss
scoring_elements 0.73939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16302
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870267
reference_id 1870267
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870267
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16302
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wed-eqxt-pygs
13
url VCID-95yj-ph8u-2fbq
vulnerability_id VCID-95yj-ph8u-2fbq
summary security update
references
0
reference_url http://jvn.jp/en/jp/JVN52486659/index.html
reference_id
reference_type
scores
url http://jvn.jp/en/jp/JVN52486659/index.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14869.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14869.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14869
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50398
published_at 2026-04-01T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50515
published_at 2026-04-21T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50529
published_at 2026-04-11T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50506
published_at 2026-04-12T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50491
published_at 2026-04-13T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50533
published_at 2026-04-16T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50539
published_at 2026-04-18T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-02T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50482
published_at 2026-04-04T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-07T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.50489
published_at 2026-04-08T12:55:00Z
11
value 0.0027
scoring_system epss
scoring_elements 0.50486
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14869
5
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=701841
reference_id
reference_type
scores
url https://bugs.ghostscript.com/show_bug.cgi?id=701841
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f
reference_id
reference_type
scores
url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q4E3OTDAJRSUCOBTDQO7Y5UTE2FFMLF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q4E3OTDAJRSUCOBTDQO7Y5UTE2FFMLF/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HC4REO73BEJOJAU7NHFHJECAUAYJUE3H/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HC4REO73BEJOJAU7NHFHJECAUAYJUE3H/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX55AEDERTDFEZAROKZW64MZRPLINEGI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX55AEDERTDFEZAROKZW64MZRPLINEGI/
13
reference_url https://seclists.org/bugtraq/2019/Nov/27
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Nov/27
14
reference_url http://www.openwall.com/lists/oss-security/2019/11/15/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/11/15/1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1768911
reference_id 1768911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1768911
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944760
reference_id 944760
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944760
17
reference_url https://security.archlinux.org/AVG-1069
reference_id AVG-1069
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1069
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14869
reference_id CVE-2019-14869
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14869
25
reference_url https://access.redhat.com/errata/RHSA-2019:3888
reference_id RHSA-2019:3888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3888
26
reference_url https://access.redhat.com/errata/RHSA-2019:3890
reference_id RHSA-2019:3890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3890
27
reference_url https://access.redhat.com/errata/RHSA-2020:0222
reference_id RHSA-2020:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0222
28
reference_url https://usn.ubuntu.com/4193-1/
reference_id USN-4193-1
reference_type
scores
url https://usn.ubuntu.com/4193-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
purl pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-2ypb-qhkv-1yfe
4
vulnerability VCID-3gax-xvqu-ykhh
5
vulnerability VCID-3sxw-86yd-gqe1
6
vulnerability VCID-479g-vu9e-1ygz
7
vulnerability VCID-4eac-yk5k-mueh
8
vulnerability VCID-4grr-m9cp-x3fm
9
vulnerability VCID-4h4k-fmtp-j7bg
10
vulnerability VCID-4zba-5tgb-nufd
11
vulnerability VCID-6zft-uqxb-pkh2
12
vulnerability VCID-79q2-phm8-e7cv
13
vulnerability VCID-7anb-rnxg-97h8
14
vulnerability VCID-7ap3-6gs2-fbgs
15
vulnerability VCID-7u9a-5pkt-4fbf
16
vulnerability VCID-8hfa-4qua-tuab
17
vulnerability VCID-8wed-eqxt-pygs
18
vulnerability VCID-8wfs-knnp-8ub1
19
vulnerability VCID-95yj-ph8u-2fbq
20
vulnerability VCID-ae31-n66y-akcg
21
vulnerability VCID-b1zp-sfch-u3c1
22
vulnerability VCID-barv-t623-h3e5
23
vulnerability VCID-bnpf-udu2-hqbk
24
vulnerability VCID-c6ms-5wr2-kbfj
25
vulnerability VCID-e8bh-th45-vfgg
26
vulnerability VCID-eqhh-t7qd-vuav
27
vulnerability VCID-eypv-n5ea-abgn
28
vulnerability VCID-fehm-g4fq-pfb2
29
vulnerability VCID-ge8e-fm7t-gqgj
30
vulnerability VCID-gjj2-k1mt-sbgv
31
vulnerability VCID-gv9z-e7t9-m7g6
32
vulnerability VCID-h7py-se4n-6bdy
33
vulnerability VCID-hc8b-qzqp-pqdn
34
vulnerability VCID-ht37-jj18-t3c5
35
vulnerability VCID-hy2v-rkzm-nka1
36
vulnerability VCID-k2rj-x3d7-ryd2
37
vulnerability VCID-kd8x-74zr-e7dd
38
vulnerability VCID-kjpt-6dws-9ufd
39
vulnerability VCID-kk8v-381v-sybr
40
vulnerability VCID-kw3r-f2mb-cyf6
41
vulnerability VCID-mg71-sbsj-2yam
42
vulnerability VCID-mqgf-gbdy-4uav
43
vulnerability VCID-mr6f-95kb-wfhf
44
vulnerability VCID-n8rh-znkz-tfdt
45
vulnerability VCID-nhtp-m11f-xuh6
46
vulnerability VCID-nsan-3rne-7fbw
47
vulnerability VCID-pjph-6muk-aff3
48
vulnerability VCID-pnwf-fw4h-r3g3
49
vulnerability VCID-pvfx-6ymq-6qbf
50
vulnerability VCID-q9by-9s2x-z3au
51
vulnerability VCID-qvq2-xbp6-m3fy
52
vulnerability VCID-s9t8-smvb-wkd4
53
vulnerability VCID-sj4u-xzg3-z3hf
54
vulnerability VCID-snzm-pkb8-9fcp
55
vulnerability VCID-thz5-yhwy-63fc
56
vulnerability VCID-tp6u-sxuv-a3a6
57
vulnerability VCID-trcm-319g-5qhu
58
vulnerability VCID-ue85-9uqn-xye4
59
vulnerability VCID-uryu-n1p2-mugy
60
vulnerability VCID-vkxy-8vep-x7bg
61
vulnerability VCID-vw3z-bxb8-qkdq
62
vulnerability VCID-wtv2-9jx7-kkgz
63
vulnerability VCID-x5ce-v7bc-ufam
64
vulnerability VCID-x6p8-v4bm-nqhs
65
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6
1
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
2
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2019-14869
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95yj-ph8u-2fbq
14
url VCID-ae31-n66y-akcg
vulnerability_id VCID-ae31-n66y-akcg
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16296.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16296
reference_id
reference_type
scores
0
value 0.00434
scoring_system epss
scoring_elements 0.62704
published_at 2026-04-01T12:55:00Z
1
value 0.00434
scoring_system epss
scoring_elements 0.62761
published_at 2026-04-02T12:55:00Z
2
value 0.00434
scoring_system epss
scoring_elements 0.62791
published_at 2026-04-04T12:55:00Z
3
value 0.00434
scoring_system epss
scoring_elements 0.62755
published_at 2026-04-07T12:55:00Z
4
value 0.00434
scoring_system epss
scoring_elements 0.62807
published_at 2026-04-13T12:55:00Z
5
value 0.00434
scoring_system epss
scoring_elements 0.62824
published_at 2026-04-09T12:55:00Z
6
value 0.00434
scoring_system epss
scoring_elements 0.62842
published_at 2026-04-11T12:55:00Z
7
value 0.00434
scoring_system epss
scoring_elements 0.62831
published_at 2026-04-12T12:55:00Z
8
value 0.00434
scoring_system epss
scoring_elements 0.62848
published_at 2026-04-16T12:55:00Z
9
value 0.00434
scoring_system epss
scoring_elements 0.62855
published_at 2026-04-18T12:55:00Z
10
value 0.00434
scoring_system epss
scoring_elements 0.62836
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870175
reference_id 1870175
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870175
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16296
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ae31-n66y-akcg
15
url VCID-b1zp-sfch-u3c1
vulnerability_id VCID-b1zp-sfch-u3c1
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16309.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16309
reference_id
reference_type
scores
0
value 0.01475
scoring_system epss
scoring_elements 0.80902
published_at 2026-04-01T12:55:00Z
1
value 0.01475
scoring_system epss
scoring_elements 0.80911
published_at 2026-04-02T12:55:00Z
2
value 0.01475
scoring_system epss
scoring_elements 0.80933
published_at 2026-04-04T12:55:00Z
3
value 0.01475
scoring_system epss
scoring_elements 0.8093
published_at 2026-04-07T12:55:00Z
4
value 0.01475
scoring_system epss
scoring_elements 0.80958
published_at 2026-04-08T12:55:00Z
5
value 0.01475
scoring_system epss
scoring_elements 0.80965
published_at 2026-04-09T12:55:00Z
6
value 0.01475
scoring_system epss
scoring_elements 0.80981
published_at 2026-04-11T12:55:00Z
7
value 0.01475
scoring_system epss
scoring_elements 0.80968
published_at 2026-04-12T12:55:00Z
8
value 0.01475
scoring_system epss
scoring_elements 0.80959
published_at 2026-04-13T12:55:00Z
9
value 0.01475
scoring_system epss
scoring_elements 0.80997
published_at 2026-04-16T12:55:00Z
10
value 0.01475
scoring_system epss
scoring_elements 0.80998
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870248
reference_id 1870248
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870248
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16309
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b1zp-sfch-u3c1
16
url VCID-e8bh-th45-vfgg
vulnerability_id VCID-e8bh-th45-vfgg
summary ghostscript: Heap buffer overflow in clj_media_size function in devices/gdevclj.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21890.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-21890
reference_id
reference_type
scores
0
value 0.01228
scoring_system epss
scoring_elements 0.7909
published_at 2026-04-01T12:55:00Z
1
value 0.01228
scoring_system epss
scoring_elements 0.79097
published_at 2026-04-02T12:55:00Z
2
value 0.01228
scoring_system epss
scoring_elements 0.79164
published_at 2026-04-21T12:55:00Z
3
value 0.01228
scoring_system epss
scoring_elements 0.79151
published_at 2026-04-12T12:55:00Z
4
value 0.01228
scoring_system epss
scoring_elements 0.79168
published_at 2026-04-16T12:55:00Z
5
value 0.01228
scoring_system epss
scoring_elements 0.79123
published_at 2026-04-04T12:55:00Z
6
value 0.01228
scoring_system epss
scoring_elements 0.79109
published_at 2026-04-07T12:55:00Z
7
value 0.01228
scoring_system epss
scoring_elements 0.79134
published_at 2026-04-08T12:55:00Z
8
value 0.01228
scoring_system epss
scoring_elements 0.79142
published_at 2026-04-13T12:55:00Z
9
value 0.01228
scoring_system epss
scoring_elements 0.79166
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-21890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21890
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235002
reference_id 2235002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235002
4
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:13:44Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html
5
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=701846
reference_id show_bug.cgi?id=701846
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:13:44Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=701846
6
reference_url https://usn.ubuntu.com/6364-1/
reference_id USN-6364-1
reference_type
scores
url https://usn.ubuntu.com/6364-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-21890
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8bh-th45-vfgg
17
url VCID-eqhh-t7qd-vuav
vulnerability_id VCID-eqhh-t7qd-vuav
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19
reference_id
reference_type
scores
url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
3
reference_url https://access.redhat.com/errata/RHBA-2019:2824
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:2824
4
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2594
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14817.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14817.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14817
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.58231
published_at 2026-04-01T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.5836
published_at 2026-04-21T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58371
published_at 2026-04-09T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58388
published_at 2026-04-11T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58346
published_at 2026-04-13T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58378
published_at 2026-04-16T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58382
published_at 2026-04-18T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58317
published_at 2026-04-02T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58337
published_at 2026-04-04T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58312
published_at 2026-04-07T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58365
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14817
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
17
reference_url https://seclists.org/bugtraq/2019/Sep/15
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/15
18
reference_url https://www.debian.org/security/2019/dsa-4518
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4518
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1744042
reference_id 1744042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1744042
20
reference_url https://security.archlinux.org/ASA-201911-5
reference_id ASA-201911-5
reference_type
scores
url https://security.archlinux.org/ASA-201911-5
21
reference_url https://security.archlinux.org/AVG-1031
reference_id AVG-1031
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1031
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14817
reference_id CVE-2019-14817
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14817
34
reference_url https://security.gentoo.org/glsa/202004-03
reference_id GLSA-202004-03
reference_type
scores
url https://security.gentoo.org/glsa/202004-03
35
reference_url https://access.redhat.com/errata/RHSA-2019:2534
reference_id RHSA-2019:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2534
36
reference_url https://access.redhat.com/errata/RHSA-2019:2586
reference_id RHSA-2019:2586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2586
37
reference_url https://access.redhat.com/errata/RHSA-2019:2591
reference_id RHSA-2019:2591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2591
38
reference_url https://usn.ubuntu.com/4111-1/
reference_id USN-4111-1
reference_type
scores
url https://usn.ubuntu.com/4111-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
purl pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-2ypb-qhkv-1yfe
4
vulnerability VCID-3gax-xvqu-ykhh
5
vulnerability VCID-3sxw-86yd-gqe1
6
vulnerability VCID-479g-vu9e-1ygz
7
vulnerability VCID-4eac-yk5k-mueh
8
vulnerability VCID-4grr-m9cp-x3fm
9
vulnerability VCID-4h4k-fmtp-j7bg
10
vulnerability VCID-4zba-5tgb-nufd
11
vulnerability VCID-6zft-uqxb-pkh2
12
vulnerability VCID-79q2-phm8-e7cv
13
vulnerability VCID-7anb-rnxg-97h8
14
vulnerability VCID-7ap3-6gs2-fbgs
15
vulnerability VCID-7u9a-5pkt-4fbf
16
vulnerability VCID-8hfa-4qua-tuab
17
vulnerability VCID-8wed-eqxt-pygs
18
vulnerability VCID-8wfs-knnp-8ub1
19
vulnerability VCID-95yj-ph8u-2fbq
20
vulnerability VCID-ae31-n66y-akcg
21
vulnerability VCID-b1zp-sfch-u3c1
22
vulnerability VCID-barv-t623-h3e5
23
vulnerability VCID-bnpf-udu2-hqbk
24
vulnerability VCID-c6ms-5wr2-kbfj
25
vulnerability VCID-e8bh-th45-vfgg
26
vulnerability VCID-eqhh-t7qd-vuav
27
vulnerability VCID-eypv-n5ea-abgn
28
vulnerability VCID-fehm-g4fq-pfb2
29
vulnerability VCID-ge8e-fm7t-gqgj
30
vulnerability VCID-gjj2-k1mt-sbgv
31
vulnerability VCID-gv9z-e7t9-m7g6
32
vulnerability VCID-h7py-se4n-6bdy
33
vulnerability VCID-hc8b-qzqp-pqdn
34
vulnerability VCID-ht37-jj18-t3c5
35
vulnerability VCID-hy2v-rkzm-nka1
36
vulnerability VCID-k2rj-x3d7-ryd2
37
vulnerability VCID-kd8x-74zr-e7dd
38
vulnerability VCID-kjpt-6dws-9ufd
39
vulnerability VCID-kk8v-381v-sybr
40
vulnerability VCID-kw3r-f2mb-cyf6
41
vulnerability VCID-mg71-sbsj-2yam
42
vulnerability VCID-mqgf-gbdy-4uav
43
vulnerability VCID-mr6f-95kb-wfhf
44
vulnerability VCID-n8rh-znkz-tfdt
45
vulnerability VCID-nhtp-m11f-xuh6
46
vulnerability VCID-nsan-3rne-7fbw
47
vulnerability VCID-pjph-6muk-aff3
48
vulnerability VCID-pnwf-fw4h-r3g3
49
vulnerability VCID-pvfx-6ymq-6qbf
50
vulnerability VCID-q9by-9s2x-z3au
51
vulnerability VCID-qvq2-xbp6-m3fy
52
vulnerability VCID-s9t8-smvb-wkd4
53
vulnerability VCID-sj4u-xzg3-z3hf
54
vulnerability VCID-snzm-pkb8-9fcp
55
vulnerability VCID-thz5-yhwy-63fc
56
vulnerability VCID-tp6u-sxuv-a3a6
57
vulnerability VCID-trcm-319g-5qhu
58
vulnerability VCID-ue85-9uqn-xye4
59
vulnerability VCID-uryu-n1p2-mugy
60
vulnerability VCID-vkxy-8vep-x7bg
61
vulnerability VCID-vw3z-bxb8-qkdq
62
vulnerability VCID-wtv2-9jx7-kkgz
63
vulnerability VCID-x5ce-v7bc-ufam
64
vulnerability VCID-x6p8-v4bm-nqhs
65
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6
1
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
2
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2019-14817
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqhh-t7qd-vuav
18
url VCID-fehm-g4fq-pfb2
vulnerability_id VCID-fehm-g4fq-pfb2
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16306.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16306.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16306
reference_id
reference_type
scores
0
value 0.01771
scoring_system epss
scoring_elements 0.82582
published_at 2026-04-01T12:55:00Z
1
value 0.01771
scoring_system epss
scoring_elements 0.82597
published_at 2026-04-02T12:55:00Z
2
value 0.01771
scoring_system epss
scoring_elements 0.82612
published_at 2026-04-04T12:55:00Z
3
value 0.01771
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-07T12:55:00Z
4
value 0.01771
scoring_system epss
scoring_elements 0.82634
published_at 2026-04-08T12:55:00Z
5
value 0.01771
scoring_system epss
scoring_elements 0.82642
published_at 2026-04-09T12:55:00Z
6
value 0.01771
scoring_system epss
scoring_elements 0.82659
published_at 2026-04-11T12:55:00Z
7
value 0.01771
scoring_system epss
scoring_elements 0.82654
published_at 2026-04-12T12:55:00Z
8
value 0.01771
scoring_system epss
scoring_elements 0.82649
published_at 2026-04-13T12:55:00Z
9
value 0.01771
scoring_system epss
scoring_elements 0.82686
published_at 2026-04-16T12:55:00Z
10
value 0.01771
scoring_system epss
scoring_elements 0.82687
published_at 2026-04-18T12:55:00Z
11
value 0.01771
scoring_system epss
scoring_elements 0.8269
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16306
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870165
reference_id 1870165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870165
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16306
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fehm-g4fq-pfb2
19
url VCID-ge8e-fm7t-gqgj
vulnerability_id VCID-ge8e-fm7t-gqgj
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16290.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16290
reference_id
reference_type
scores
0
value 0.01421
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-01T12:55:00Z
1
value 0.01421
scoring_system epss
scoring_elements 0.80541
published_at 2026-04-02T12:55:00Z
2
value 0.01421
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-04T12:55:00Z
3
value 0.01421
scoring_system epss
scoring_elements 0.80556
published_at 2026-04-07T12:55:00Z
4
value 0.01421
scoring_system epss
scoring_elements 0.80585
published_at 2026-04-08T12:55:00Z
5
value 0.01421
scoring_system epss
scoring_elements 0.80594
published_at 2026-04-09T12:55:00Z
6
value 0.01421
scoring_system epss
scoring_elements 0.80611
published_at 2026-04-11T12:55:00Z
7
value 0.01421
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-12T12:55:00Z
8
value 0.01421
scoring_system epss
scoring_elements 0.8059
published_at 2026-04-13T12:55:00Z
9
value 0.01421
scoring_system epss
scoring_elements 0.80619
published_at 2026-04-16T12:55:00Z
10
value 0.01421
scoring_system epss
scoring_elements 0.80622
published_at 2026-04-18T12:55:00Z
11
value 0.01421
scoring_system epss
scoring_elements 0.80625
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16290
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870149
reference_id 1870149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870149
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16290
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ge8e-fm7t-gqgj
20
url VCID-h7py-se4n-6bdy
vulnerability_id VCID-h7py-se4n-6bdy
summary Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43115.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43115
reference_id
reference_type
scores
0
value 0.21677
scoring_system epss
scoring_elements 0.95711
published_at 2026-04-02T12:55:00Z
1
value 0.21677
scoring_system epss
scoring_elements 0.95718
published_at 2026-04-04T12:55:00Z
2
value 0.21677
scoring_system epss
scoring_elements 0.95721
published_at 2026-04-07T12:55:00Z
3
value 0.21677
scoring_system epss
scoring_elements 0.9573
published_at 2026-04-08T12:55:00Z
4
value 0.21677
scoring_system epss
scoring_elements 0.95733
published_at 2026-04-09T12:55:00Z
5
value 0.21677
scoring_system epss
scoring_elements 0.95737
published_at 2026-04-11T12:55:00Z
6
value 0.21677
scoring_system epss
scoring_elements 0.95736
published_at 2026-04-12T12:55:00Z
7
value 0.21677
scoring_system epss
scoring_elements 0.95738
published_at 2026-04-13T12:55:00Z
8
value 0.21677
scoring_system epss
scoring_elements 0.95747
published_at 2026-04-16T12:55:00Z
9
value 0.21677
scoring_system epss
scoring_elements 0.95751
published_at 2026-04-18T12:55:00Z
10
value 0.21677
scoring_system epss
scoring_elements 0.95752
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43115
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43115
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241108
reference_id 2241108
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241108
5
reference_url https://access.redhat.com/errata/RHSA-2023:5868
reference_id RHSA-2023:5868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5868
6
reference_url https://access.redhat.com/errata/RHSA-2023:6265
reference_id RHSA-2023:6265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6265
7
reference_url https://access.redhat.com/errata/RHSA-2023:6732
reference_id RHSA-2023:6732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6732
8
reference_url https://usn.ubuntu.com/6433-1/
reference_id USN-6433-1
reference_type
scores
url https://usn.ubuntu.com/6433-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2023-43115
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7py-se4n-6bdy
21
url VCID-hc8b-qzqp-pqdn
vulnerability_id VCID-hc8b-qzqp-pqdn
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33870.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33870
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23379
published_at 2026-04-21T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23477
published_at 2026-04-11T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23439
published_at 2026-04-12T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23384
published_at 2026-04-13T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23402
published_at 2026-04-16T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23397
published_at 2026-04-18T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23516
published_at 2026-04-02T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23552
published_at 2026-04-04T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23335
published_at 2026-04-07T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23408
published_at 2026-04-08T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23458
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.openwall.com/lists/oss-security/2024/06/28/2
reference_id 2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:38:36Z/
url https://www.openwall.com/lists/oss-security/2024/06/28/2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293959
reference_id 2293959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293959
10
reference_url https://security.gentoo.org/glsa/202409-03
reference_id GLSA-202409-03
reference_type
scores
url https://security.gentoo.org/glsa/202409-03
11
reference_url https://access.redhat.com/errata/RHSA-2024:6197
reference_id RHSA-2024:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6197
12
reference_url https://access.redhat.com/errata/RHSA-2024:6466
reference_id RHSA-2024:6466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6466
13
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707686
reference_id show_bug.cgi?id=707686
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:38:36Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707686
14
reference_url https://usn.ubuntu.com/6835-1/
reference_id USN-6835-1
reference_type
scores
url https://usn.ubuntu.com/6835-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2024-33870
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hc8b-qzqp-pqdn
22
url VCID-ht37-jj18-t3c5
vulnerability_id VCID-ht37-jj18-t3c5
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17538.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17538
reference_id
reference_type
scores
0
value 0.0068
scoring_system epss
scoring_elements 0.7154
published_at 2026-04-01T12:55:00Z
1
value 0.0068
scoring_system epss
scoring_elements 0.71547
published_at 2026-04-02T12:55:00Z
2
value 0.0068
scoring_system epss
scoring_elements 0.71565
published_at 2026-04-04T12:55:00Z
3
value 0.0068
scoring_system epss
scoring_elements 0.71538
published_at 2026-04-07T12:55:00Z
4
value 0.0068
scoring_system epss
scoring_elements 0.71577
published_at 2026-04-13T12:55:00Z
5
value 0.0068
scoring_system epss
scoring_elements 0.71588
published_at 2026-04-09T12:55:00Z
6
value 0.0068
scoring_system epss
scoring_elements 0.71611
published_at 2026-04-11T12:55:00Z
7
value 0.0068
scoring_system epss
scoring_elements 0.71596
published_at 2026-04-12T12:55:00Z
8
value 0.0068
scoring_system epss
scoring_elements 0.71622
published_at 2026-04-16T12:55:00Z
9
value 0.0068
scoring_system epss
scoring_elements 0.71627
published_at 2026-04-18T12:55:00Z
10
value 0.0068
scoring_system epss
scoring_elements 0.71607
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17538
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870249
reference_id 1870249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870249
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-17538
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ht37-jj18-t3c5
23
url VCID-hy2v-rkzm-nka1
vulnerability_id VCID-hy2v-rkzm-nka1
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16300.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16300.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16300
reference_id
reference_type
scores
0
value 0.01091
scoring_system epss
scoring_elements 0.77888
published_at 2026-04-01T12:55:00Z
1
value 0.01091
scoring_system epss
scoring_elements 0.77895
published_at 2026-04-02T12:55:00Z
2
value 0.01091
scoring_system epss
scoring_elements 0.77923
published_at 2026-04-04T12:55:00Z
3
value 0.01091
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-07T12:55:00Z
4
value 0.01091
scoring_system epss
scoring_elements 0.77933
published_at 2026-04-08T12:55:00Z
5
value 0.01091
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-09T12:55:00Z
6
value 0.01091
scoring_system epss
scoring_elements 0.77963
published_at 2026-04-11T12:55:00Z
7
value 0.01091
scoring_system epss
scoring_elements 0.77948
published_at 2026-04-12T12:55:00Z
8
value 0.01091
scoring_system epss
scoring_elements 0.77947
published_at 2026-04-13T12:55:00Z
9
value 0.01091
scoring_system epss
scoring_elements 0.77982
published_at 2026-04-16T12:55:00Z
10
value 0.01091
scoring_system epss
scoring_elements 0.77981
published_at 2026-04-18T12:55:00Z
11
value 0.01091
scoring_system epss
scoring_elements 0.77974
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16300
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870169
reference_id 1870169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870169
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16300
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hy2v-rkzm-nka1
24
url VCID-kd8x-74zr-e7dd
vulnerability_id VCID-kd8x-74zr-e7dd
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16303.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16303.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16303
reference_id
reference_type
scores
0
value 0.02945
scoring_system epss
scoring_elements 0.8638
published_at 2026-04-01T12:55:00Z
1
value 0.02945
scoring_system epss
scoring_elements 0.86391
published_at 2026-04-02T12:55:00Z
2
value 0.02945
scoring_system epss
scoring_elements 0.86408
published_at 2026-04-04T12:55:00Z
3
value 0.02945
scoring_system epss
scoring_elements 0.86409
published_at 2026-04-07T12:55:00Z
4
value 0.02945
scoring_system epss
scoring_elements 0.86428
published_at 2026-04-08T12:55:00Z
5
value 0.02945
scoring_system epss
scoring_elements 0.86438
published_at 2026-04-09T12:55:00Z
6
value 0.02945
scoring_system epss
scoring_elements 0.86452
published_at 2026-04-11T12:55:00Z
7
value 0.02945
scoring_system epss
scoring_elements 0.86451
published_at 2026-04-12T12:55:00Z
8
value 0.02945
scoring_system epss
scoring_elements 0.86445
published_at 2026-04-13T12:55:00Z
9
value 0.02945
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-16T12:55:00Z
10
value 0.02945
scoring_system epss
scoring_elements 0.86467
published_at 2026-04-18T12:55:00Z
11
value 0.02945
scoring_system epss
scoring_elements 0.86459
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16303
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870258
reference_id 1870258
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870258
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16303
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kd8x-74zr-e7dd
25
url VCID-kjpt-6dws-9ufd
vulnerability_id VCID-kjpt-6dws-9ufd
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16305.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16305
reference_id
reference_type
scores
0
value 0.00474
scoring_system epss
scoring_elements 0.64669
published_at 2026-04-01T12:55:00Z
1
value 0.00474
scoring_system epss
scoring_elements 0.64722
published_at 2026-04-02T12:55:00Z
2
value 0.00474
scoring_system epss
scoring_elements 0.6475
published_at 2026-04-04T12:55:00Z
3
value 0.00474
scoring_system epss
scoring_elements 0.64708
published_at 2026-04-07T12:55:00Z
4
value 0.00474
scoring_system epss
scoring_elements 0.64756
published_at 2026-04-08T12:55:00Z
5
value 0.00474
scoring_system epss
scoring_elements 0.64771
published_at 2026-04-09T12:55:00Z
6
value 0.00474
scoring_system epss
scoring_elements 0.64788
published_at 2026-04-11T12:55:00Z
7
value 0.00474
scoring_system epss
scoring_elements 0.64776
published_at 2026-04-12T12:55:00Z
8
value 0.00474
scoring_system epss
scoring_elements 0.64749
published_at 2026-04-13T12:55:00Z
9
value 0.00474
scoring_system epss
scoring_elements 0.64787
published_at 2026-04-16T12:55:00Z
10
value 0.00474
scoring_system epss
scoring_elements 0.64798
published_at 2026-04-18T12:55:00Z
11
value 0.00474
scoring_system epss
scoring_elements 0.64784
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16305
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870257
reference_id 1870257
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870257
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16305
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kjpt-6dws-9ufd
26
url VCID-kw3r-f2mb-cyf6
vulnerability_id VCID-kw3r-f2mb-cyf6
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15900.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15900
reference_id
reference_type
scores
0
value 0.10993
scoring_system epss
scoring_elements 0.93454
published_at 2026-04-21T12:55:00Z
1
value 0.10993
scoring_system epss
scoring_elements 0.93443
published_at 2026-04-16T12:55:00Z
2
value 0.10993
scoring_system epss
scoring_elements 0.93448
published_at 2026-04-18T12:55:00Z
3
value 0.11034
scoring_system epss
scoring_elements 0.93409
published_at 2026-04-02T12:55:00Z
4
value 0.11034
scoring_system epss
scoring_elements 0.93425
published_at 2026-04-08T12:55:00Z
5
value 0.11034
scoring_system epss
scoring_elements 0.93428
published_at 2026-04-09T12:55:00Z
6
value 0.11034
scoring_system epss
scoring_elements 0.93434
published_at 2026-04-12T12:55:00Z
7
value 0.11034
scoring_system epss
scoring_elements 0.93435
published_at 2026-04-13T12:55:00Z
8
value 0.11034
scoring_system epss
scoring_elements 0.93401
published_at 2026-04-01T12:55:00Z
9
value 0.11034
scoring_system epss
scoring_elements 0.93417
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1859492
reference_id 1859492
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1859492
5
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
6
reference_url https://usn.ubuntu.com/4445-1/
reference_id USN-4445-1
reference_type
scores
url https://usn.ubuntu.com/4445-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-15900
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kw3r-f2mb-cyf6
27
url VCID-mg71-sbsj-2yam
vulnerability_id VCID-mg71-sbsj-2yam
summary Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3781.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3781
reference_id
reference_type
scores
0
value 0.06952
scoring_system epss
scoring_elements 0.91437
published_at 2026-04-12T12:55:00Z
1
value 0.07045
scoring_system epss
scoring_elements 0.91454
published_at 2026-04-02T12:55:00Z
2
value 0.07045
scoring_system epss
scoring_elements 0.91463
published_at 2026-04-04T12:55:00Z
3
value 0.07045
scoring_system epss
scoring_elements 0.9147
published_at 2026-04-07T12:55:00Z
4
value 0.07045
scoring_system epss
scoring_elements 0.91483
published_at 2026-04-08T12:55:00Z
5
value 0.07045
scoring_system epss
scoring_elements 0.91448
published_at 2026-04-01T12:55:00Z
6
value 0.07045
scoring_system epss
scoring_elements 0.91489
published_at 2026-04-09T12:55:00Z
7
value 0.07045
scoring_system epss
scoring_elements 0.91495
published_at 2026-04-11T12:55:00Z
8
value 0.07893
scoring_system epss
scoring_elements 0.92037
published_at 2026-04-21T12:55:00Z
9
value 0.07893
scoring_system epss
scoring_elements 0.92024
published_at 2026-04-13T12:55:00Z
10
value 0.07893
scoring_system epss
scoring_elements 0.92042
published_at 2026-04-16T12:55:00Z
11
value 0.07893
scoring_system epss
scoring_elements 0.92039
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2002271
reference_id 2002271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2002271
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994011
reference_id 994011
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994011
6
reference_url https://security.archlinux.org/ASA-202109-3
reference_id ASA-202109-3
reference_type
scores
url https://security.archlinux.org/ASA-202109-3
7
reference_url https://security.archlinux.org/AVG-2374
reference_id AVG-2374
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2374
8
reference_url https://security.gentoo.org/glsa/202211-11
reference_id GLSA-202211-11
reference_type
scores
url https://security.gentoo.org/glsa/202211-11
9
reference_url https://usn.ubuntu.com/5075-1/
reference_id USN-5075-1
reference_type
scores
url https://usn.ubuntu.com/5075-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2021-3781
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mg71-sbsj-2yam
28
url VCID-mqgf-gbdy-4uav
vulnerability_id VCID-mqgf-gbdy-4uav
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16288.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16288.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16288
reference_id
reference_type
scores
0
value 0.01091
scoring_system epss
scoring_elements 0.77888
published_at 2026-04-01T12:55:00Z
1
value 0.01091
scoring_system epss
scoring_elements 0.77895
published_at 2026-04-02T12:55:00Z
2
value 0.01091
scoring_system epss
scoring_elements 0.77923
published_at 2026-04-04T12:55:00Z
3
value 0.01091
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-07T12:55:00Z
4
value 0.01091
scoring_system epss
scoring_elements 0.77933
published_at 2026-04-08T12:55:00Z
5
value 0.01091
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-09T12:55:00Z
6
value 0.01091
scoring_system epss
scoring_elements 0.77963
published_at 2026-04-11T12:55:00Z
7
value 0.01091
scoring_system epss
scoring_elements 0.77948
published_at 2026-04-12T12:55:00Z
8
value 0.01091
scoring_system epss
scoring_elements 0.77947
published_at 2026-04-13T12:55:00Z
9
value 0.01091
scoring_system epss
scoring_elements 0.77982
published_at 2026-04-16T12:55:00Z
10
value 0.01091
scoring_system epss
scoring_elements 0.77981
published_at 2026-04-18T12:55:00Z
11
value 0.01091
scoring_system epss
scoring_elements 0.77974
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16288
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870266
reference_id 1870266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870266
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16288
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqgf-gbdy-4uav
29
url VCID-mr6f-95kb-wfhf
vulnerability_id VCID-mr6f-95kb-wfhf
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28879.json
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28879
reference_id
reference_type
scores
0
value 0.31221
scoring_system epss
scoring_elements 0.96742
published_at 2026-04-02T12:55:00Z
1
value 0.31221
scoring_system epss
scoring_elements 0.96767
published_at 2026-04-16T12:55:00Z
2
value 0.31221
scoring_system epss
scoring_elements 0.96761
published_at 2026-04-13T12:55:00Z
3
value 0.31221
scoring_system epss
scoring_elements 0.96758
published_at 2026-04-12T12:55:00Z
4
value 0.31221
scoring_system epss
scoring_elements 0.96755
published_at 2026-04-09T12:55:00Z
5
value 0.31221
scoring_system epss
scoring_elements 0.96754
published_at 2026-04-08T12:55:00Z
6
value 0.31221
scoring_system epss
scoring_elements 0.96743
published_at 2026-04-04T12:55:00Z
7
value 0.31221
scoring_system epss
scoring_elements 0.96747
published_at 2026-04-07T12:55:00Z
8
value 0.34217
scoring_system epss
scoring_elements 0.96991
published_at 2026-04-21T12:55:00Z
9
value 0.34217
scoring_system epss
scoring_elements 0.96989
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033757
reference_id 1033757
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033757
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2184585
reference_id 2184585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2184585
6
reference_url http://www.openwall.com/lists/oss-security/2023/04/12/4
reference_id 4
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url http://www.openwall.com/lists/oss-security/2023/04/12/4
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/
reference_id CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/
reference_id DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/
9
reference_url https://www.debian.org/security/2023/dsa-5383
reference_id dsa-5383
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://www.debian.org/security/2023/dsa-5383
10
reference_url https://security.gentoo.org/glsa/202309-03
reference_id GLSA-202309-03
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://security.gentoo.org/glsa/202309-03
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/
reference_id MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html
13
reference_url https://ghostscript.readthedocs.io/en/latest/News.html
reference_id News.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://ghostscript.readthedocs.io/en/latest/News.html
14
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179
reference_id ?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179
15
reference_url https://access.redhat.com/errata/RHSA-2023:6544
reference_id RHSA-2023:6544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6544
16
reference_url https://access.redhat.com/errata/RHSA-2023:7053
reference_id RHSA-2023:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7053
17
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=706494
reference_id show_bug.cgi?id=706494
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=706494
18
reference_url https://usn.ubuntu.com/6017-1/
reference_id USN-6017-1
reference_type
scores
url https://usn.ubuntu.com/6017-1/
19
reference_url https://usn.ubuntu.com/6017-2/
reference_id USN-6017-2
reference_type
scores
url https://usn.ubuntu.com/6017-2/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2023-28879
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mr6f-95kb-wfhf
30
url VCID-n8rh-znkz-tfdt
vulnerability_id VCID-n8rh-znkz-tfdt
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16294.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16294
reference_id
reference_type
scores
0
value 0.00743
scoring_system epss
scoring_elements 0.72951
published_at 2026-04-01T12:55:00Z
1
value 0.00743
scoring_system epss
scoring_elements 0.72963
published_at 2026-04-02T12:55:00Z
2
value 0.00743
scoring_system epss
scoring_elements 0.72983
published_at 2026-04-04T12:55:00Z
3
value 0.00743
scoring_system epss
scoring_elements 0.72959
published_at 2026-04-07T12:55:00Z
4
value 0.00743
scoring_system epss
scoring_elements 0.72996
published_at 2026-04-08T12:55:00Z
5
value 0.00743
scoring_system epss
scoring_elements 0.7301
published_at 2026-04-09T12:55:00Z
6
value 0.00743
scoring_system epss
scoring_elements 0.73034
published_at 2026-04-11T12:55:00Z
7
value 0.00743
scoring_system epss
scoring_elements 0.73013
published_at 2026-04-12T12:55:00Z
8
value 0.00743
scoring_system epss
scoring_elements 0.73007
published_at 2026-04-13T12:55:00Z
9
value 0.00743
scoring_system epss
scoring_elements 0.73049
published_at 2026-04-16T12:55:00Z
10
value 0.00743
scoring_system epss
scoring_elements 0.73058
published_at 2026-04-18T12:55:00Z
11
value 0.00743
scoring_system epss
scoring_elements 0.73051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870229
reference_id 1870229
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870229
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16294
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n8rh-znkz-tfdt
31
url VCID-nhtp-m11f-xuh6
vulnerability_id VCID-nhtp-m11f-xuh6
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16291.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16291
reference_id
reference_type
scores
0
value 0.00432
scoring_system epss
scoring_elements 0.62668
published_at 2026-04-21T12:55:00Z
1
value 0.00432
scoring_system epss
scoring_elements 0.62659
published_at 2026-04-12T12:55:00Z
2
value 0.00432
scoring_system epss
scoring_elements 0.62636
published_at 2026-04-13T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62678
published_at 2026-04-16T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62686
published_at 2026-04-18T12:55:00Z
5
value 0.01244
scoring_system epss
scoring_elements 0.79273
published_at 2026-04-08T12:55:00Z
6
value 0.01244
scoring_system epss
scoring_elements 0.7928
published_at 2026-04-09T12:55:00Z
7
value 0.01244
scoring_system epss
scoring_elements 0.79305
published_at 2026-04-11T12:55:00Z
8
value 0.01244
scoring_system epss
scoring_elements 0.79232
published_at 2026-04-01T12:55:00Z
9
value 0.01244
scoring_system epss
scoring_elements 0.79247
published_at 2026-04-07T12:55:00Z
10
value 0.01244
scoring_system epss
scoring_elements 0.79239
published_at 2026-04-02T12:55:00Z
11
value 0.01244
scoring_system epss
scoring_elements 0.79263
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870240
reference_id 1870240
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870240
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16291
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhtp-m11f-xuh6
32
url VCID-nsan-3rne-7fbw
vulnerability_id VCID-nsan-3rne-7fbw
summary ghostscript: heap buffer over write vulnerability in GhostScript's lp8000_print_page() in gdevlp8k.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27792.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27792
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.1376
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13853
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13911
published_at 2026-04-04T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16985
published_at 2026-04-11T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.1694
published_at 2026-04-12T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16881
published_at 2026-04-13T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16817
published_at 2026-04-16T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16819
published_at 2026-04-18T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16849
published_at 2026-04-21T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16863
published_at 2026-04-07T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16953
published_at 2026-04-08T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.1701
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27792
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247179
reference_id 2247179
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247179
5
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
6
reference_url https://usn.ubuntu.com/5618-1/
reference_id USN-5618-1
reference_type
scores
url https://usn.ubuntu.com/5618-1/
7
reference_url https://usn.ubuntu.com/5643-1/
reference_id USN-5643-1
reference_type
scores
url https://usn.ubuntu.com/5643-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-27792
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nsan-3rne-7fbw
33
url VCID-pjph-6muk-aff3
vulnerability_id VCID-pjph-6muk-aff3
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33871.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33871
reference_id
reference_type
scores
0
value 0.00703
scoring_system epss
scoring_elements 0.72093
published_at 2026-04-21T12:55:00Z
1
value 0.00703
scoring_system epss
scoring_elements 0.72056
published_at 2026-04-08T12:55:00Z
2
value 0.00703
scoring_system epss
scoring_elements 0.72068
published_at 2026-04-09T12:55:00Z
3
value 0.00703
scoring_system epss
scoring_elements 0.72091
published_at 2026-04-11T12:55:00Z
4
value 0.00703
scoring_system epss
scoring_elements 0.72075
published_at 2026-04-12T12:55:00Z
5
value 0.00703
scoring_system epss
scoring_elements 0.72059
published_at 2026-04-13T12:55:00Z
6
value 0.00703
scoring_system epss
scoring_elements 0.72101
published_at 2026-04-16T12:55:00Z
7
value 0.00703
scoring_system epss
scoring_elements 0.72108
published_at 2026-04-18T12:55:00Z
8
value 0.00703
scoring_system epss
scoring_elements 0.72023
published_at 2026-04-02T12:55:00Z
9
value 0.00703
scoring_system epss
scoring_elements 0.72043
published_at 2026-04-04T12:55:00Z
10
value 0.00703
scoring_system epss
scoring_elements 0.72019
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.openwall.com/lists/oss-security/2024/06/28/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/
url https://www.openwall.com/lists/oss-security/2024/06/28/2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2283508
reference_id 2283508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2283508
10
reference_url https://security.gentoo.org/glsa/202409-03
reference_id GLSA-202409-03
reference_type
scores
url https://security.gentoo.org/glsa/202409-03
11
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=7145885041bb52cc23964f0aa2aec1b1c82b5908
reference_id ?id=7145885041bb52cc23964f0aa2aec1b1c82b5908
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=7145885041bb52cc23964f0aa2aec1b1c82b5908
12
reference_url https://access.redhat.com/errata/RHSA-2024:3999
reference_id RHSA-2024:3999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3999
13
reference_url https://access.redhat.com/errata/RHSA-2024:4000
reference_id RHSA-2024:4000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4000
14
reference_url https://access.redhat.com/errata/RHSA-2024:4014
reference_id RHSA-2024:4014
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4014
15
reference_url https://access.redhat.com/errata/RHSA-2024:4462
reference_id RHSA-2024:4462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4462
16
reference_url https://access.redhat.com/errata/RHSA-2024:4527
reference_id RHSA-2024:4527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4527
17
reference_url https://access.redhat.com/errata/RHSA-2024:4537
reference_id RHSA-2024:4537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4537
18
reference_url https://access.redhat.com/errata/RHSA-2024:4541
reference_id RHSA-2024:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4541
19
reference_url https://access.redhat.com/errata/RHSA-2024:4544
reference_id RHSA-2024:4544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4544
20
reference_url https://access.redhat.com/errata/RHSA-2024:4549
reference_id RHSA-2024:4549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4549
21
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707754
reference_id show_bug.cgi?id=707754
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707754
22
reference_url https://usn.ubuntu.com/6835-1/
reference_id USN-6835-1
reference_type
scores
url https://usn.ubuntu.com/6835-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2024-33871
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pjph-6muk-aff3
34
url VCID-q9by-9s2x-z3au
vulnerability_id VCID-q9by-9s2x-z3au
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29510.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29510.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29510
reference_id
reference_type
scores
0
value 0.06906
scoring_system epss
scoring_elements 0.91351
published_at 2026-04-02T12:55:00Z
1
value 0.08233
scoring_system epss
scoring_elements 0.92233
published_at 2026-04-21T12:55:00Z
2
value 0.08233
scoring_system epss
scoring_elements 0.92214
published_at 2026-04-08T12:55:00Z
3
value 0.08233
scoring_system epss
scoring_elements 0.92217
published_at 2026-04-09T12:55:00Z
4
value 0.08233
scoring_system epss
scoring_elements 0.92222
published_at 2026-04-11T12:55:00Z
5
value 0.08233
scoring_system epss
scoring_elements 0.92223
published_at 2026-04-12T12:55:00Z
6
value 0.08233
scoring_system epss
scoring_elements 0.9222
published_at 2026-04-13T12:55:00Z
7
value 0.08233
scoring_system epss
scoring_elements 0.92232
published_at 2026-04-16T12:55:00Z
8
value 0.08233
scoring_system epss
scoring_elements 0.92231
published_at 2026-04-18T12:55:00Z
9
value 0.08233
scoring_system epss
scoring_elements 0.92199
published_at 2026-04-04T12:55:00Z
10
value 0.08233
scoring_system epss
scoring_elements 0.92202
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29510
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293950
reference_id 2293950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293950
9
reference_url https://www.openwall.com/lists/oss-security/2024/07/03/7
reference_id 7
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/
url https://www.openwall.com/lists/oss-security/2024/07/03/7
10
reference_url https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/
reference_id cve-2024-29510-ghostscript-format-string-exploitation
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/
url https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/
11
reference_url https://security.gentoo.org/glsa/202409-03
reference_id GLSA-202409-03
reference_type
scores
url https://security.gentoo.org/glsa/202409-03
12
reference_url https://access.redhat.com/errata/RHSA-2024:6197
reference_id RHSA-2024:6197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6197
13
reference_url https://access.redhat.com/errata/RHSA-2024:6466
reference_id RHSA-2024:6466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6466
14
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707662
reference_id show_bug.cgi?id=707662
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707662
15
reference_url https://usn.ubuntu.com/6835-1/
reference_id USN-6835-1
reference_type
scores
url https://usn.ubuntu.com/6835-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2024-29510
risk_score 10.0
exploitability 2.0
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q9by-9s2x-z3au
35
url VCID-qvq2-xbp6-m3fy
vulnerability_id VCID-qvq2-xbp6-m3fy
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16299.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16299.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16299
reference_id
reference_type
scores
0
value 0.00826
scoring_system epss
scoring_elements 0.74422
published_at 2026-04-01T12:55:00Z
1
value 0.00826
scoring_system epss
scoring_elements 0.74426
published_at 2026-04-02T12:55:00Z
2
value 0.00826
scoring_system epss
scoring_elements 0.74453
published_at 2026-04-04T12:55:00Z
3
value 0.00826
scoring_system epss
scoring_elements 0.74428
published_at 2026-04-07T12:55:00Z
4
value 0.00826
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-08T12:55:00Z
5
value 0.00826
scoring_system epss
scoring_elements 0.74477
published_at 2026-04-09T12:55:00Z
6
value 0.00826
scoring_system epss
scoring_elements 0.74499
published_at 2026-04-11T12:55:00Z
7
value 0.00826
scoring_system epss
scoring_elements 0.74479
published_at 2026-04-12T12:55:00Z
8
value 0.00826
scoring_system epss
scoring_elements 0.74471
published_at 2026-04-13T12:55:00Z
9
value 0.00826
scoring_system epss
scoring_elements 0.74508
published_at 2026-04-16T12:55:00Z
10
value 0.00826
scoring_system epss
scoring_elements 0.74516
published_at 2026-04-18T12:55:00Z
11
value 0.00826
scoring_system epss
scoring_elements 0.74507
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16299
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870171
reference_id 1870171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870171
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16299
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qvq2-xbp6-m3fy
36
url VCID-s9t8-smvb-wkd4
vulnerability_id VCID-s9t8-smvb-wkd4
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16304.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16304
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.56008
published_at 2026-04-01T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56117
published_at 2026-04-07T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56137
published_at 2026-04-04T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56168
published_at 2026-04-08T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.56173
published_at 2026-04-09T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56184
published_at 2026-04-11T12:55:00Z
6
value 0.00474
scoring_system epss
scoring_elements 0.64779
published_at 2026-04-21T12:55:00Z
7
value 0.00474
scoring_system epss
scoring_elements 0.64772
published_at 2026-04-12T12:55:00Z
8
value 0.00474
scoring_system epss
scoring_elements 0.64744
published_at 2026-04-13T12:55:00Z
9
value 0.00474
scoring_system epss
scoring_elements 0.64782
published_at 2026-04-16T12:55:00Z
10
value 0.00474
scoring_system epss
scoring_elements 0.64792
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16304
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870262
reference_id 1870262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870262
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16304
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s9t8-smvb-wkd4
37
url VCID-sj4u-xzg3-z3hf
vulnerability_id VCID-sj4u-xzg3-z3hf
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16310.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16310.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16310
reference_id
reference_type
scores
0
value 0.01789
scoring_system epss
scoring_elements 0.8268
published_at 2026-04-01T12:55:00Z
1
value 0.01789
scoring_system epss
scoring_elements 0.82696
published_at 2026-04-02T12:55:00Z
2
value 0.01789
scoring_system epss
scoring_elements 0.82709
published_at 2026-04-04T12:55:00Z
3
value 0.01789
scoring_system epss
scoring_elements 0.82706
published_at 2026-04-07T12:55:00Z
4
value 0.01789
scoring_system epss
scoring_elements 0.82731
published_at 2026-04-08T12:55:00Z
5
value 0.01789
scoring_system epss
scoring_elements 0.82738
published_at 2026-04-09T12:55:00Z
6
value 0.01789
scoring_system epss
scoring_elements 0.82755
published_at 2026-04-11T12:55:00Z
7
value 0.01789
scoring_system epss
scoring_elements 0.82749
published_at 2026-04-12T12:55:00Z
8
value 0.01789
scoring_system epss
scoring_elements 0.82746
published_at 2026-04-13T12:55:00Z
9
value 0.01789
scoring_system epss
scoring_elements 0.82784
published_at 2026-04-18T12:55:00Z
10
value 0.01789
scoring_system epss
scoring_elements 0.82788
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16310
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870159
reference_id 1870159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870159
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16310
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sj4u-xzg3-z3hf
38
url VCID-snzm-pkb8-9fcp
vulnerability_id VCID-snzm-pkb8-9fcp
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16292.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16292.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16292
reference_id
reference_type
scores
0
value 0.01091
scoring_system epss
scoring_elements 0.77888
published_at 2026-04-01T12:55:00Z
1
value 0.01091
scoring_system epss
scoring_elements 0.77895
published_at 2026-04-02T12:55:00Z
2
value 0.01091
scoring_system epss
scoring_elements 0.77923
published_at 2026-04-04T12:55:00Z
3
value 0.01091
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-07T12:55:00Z
4
value 0.01091
scoring_system epss
scoring_elements 0.77933
published_at 2026-04-08T12:55:00Z
5
value 0.01091
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-09T12:55:00Z
6
value 0.01091
scoring_system epss
scoring_elements 0.77963
published_at 2026-04-11T12:55:00Z
7
value 0.01091
scoring_system epss
scoring_elements 0.77948
published_at 2026-04-12T12:55:00Z
8
value 0.01091
scoring_system epss
scoring_elements 0.77947
published_at 2026-04-13T12:55:00Z
9
value 0.01091
scoring_system epss
scoring_elements 0.77982
published_at 2026-04-16T12:55:00Z
10
value 0.01091
scoring_system epss
scoring_elements 0.77981
published_at 2026-04-18T12:55:00Z
11
value 0.01091
scoring_system epss
scoring_elements 0.77974
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16292
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870237
reference_id 1870237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870237
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16292
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snzm-pkb8-9fcp
39
url VCID-thz5-yhwy-63fc
vulnerability_id VCID-thz5-yhwy-63fc
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16287.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16287.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16287
reference_id
reference_type
scores
0
value 0.01421
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-01T12:55:00Z
1
value 0.01421
scoring_system epss
scoring_elements 0.80541
published_at 2026-04-02T12:55:00Z
2
value 0.01421
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-04T12:55:00Z
3
value 0.01421
scoring_system epss
scoring_elements 0.80556
published_at 2026-04-07T12:55:00Z
4
value 0.01421
scoring_system epss
scoring_elements 0.80585
published_at 2026-04-08T12:55:00Z
5
value 0.01421
scoring_system epss
scoring_elements 0.80594
published_at 2026-04-09T12:55:00Z
6
value 0.01421
scoring_system epss
scoring_elements 0.80611
published_at 2026-04-11T12:55:00Z
7
value 0.01421
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-12T12:55:00Z
8
value 0.01421
scoring_system epss
scoring_elements 0.8059
published_at 2026-04-13T12:55:00Z
9
value 0.01421
scoring_system epss
scoring_elements 0.80619
published_at 2026-04-16T12:55:00Z
10
value 0.01421
scoring_system epss
scoring_elements 0.80622
published_at 2026-04-18T12:55:00Z
11
value 0.01421
scoring_system epss
scoring_elements 0.80625
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16287
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870242
reference_id 1870242
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870242
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16287
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-thz5-yhwy-63fc
40
url VCID-tp6u-sxuv-a3a6
vulnerability_id VCID-tp6u-sxuv-a3a6
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16293.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16293
reference_id
reference_type
scores
0
value 0.01311
scoring_system epss
scoring_elements 0.79749
published_at 2026-04-01T12:55:00Z
1
value 0.01311
scoring_system epss
scoring_elements 0.79757
published_at 2026-04-02T12:55:00Z
2
value 0.01311
scoring_system epss
scoring_elements 0.79778
published_at 2026-04-04T12:55:00Z
3
value 0.01311
scoring_system epss
scoring_elements 0.79764
published_at 2026-04-07T12:55:00Z
4
value 0.01311
scoring_system epss
scoring_elements 0.79793
published_at 2026-04-08T12:55:00Z
5
value 0.01311
scoring_system epss
scoring_elements 0.798
published_at 2026-04-09T12:55:00Z
6
value 0.01311
scoring_system epss
scoring_elements 0.79822
published_at 2026-04-11T12:55:00Z
7
value 0.01311
scoring_system epss
scoring_elements 0.79806
published_at 2026-04-12T12:55:00Z
8
value 0.01311
scoring_system epss
scoring_elements 0.79799
published_at 2026-04-13T12:55:00Z
9
value 0.01311
scoring_system epss
scoring_elements 0.79826
published_at 2026-04-16T12:55:00Z
10
value 0.01311
scoring_system epss
scoring_elements 0.79827
published_at 2026-04-18T12:55:00Z
11
value 0.01311
scoring_system epss
scoring_elements 0.7983
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870231
reference_id 1870231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870231
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16293
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tp6u-sxuv-a3a6
41
url VCID-trcm-319g-5qhu
vulnerability_id VCID-trcm-319g-5qhu
summary ghostscript: Out-of-bound read in base/gdevdevn.c:1973 in devn_pcx_write_rle could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38559
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.01946
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.01959
published_at 2026-04-04T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.01957
published_at 2026-04-07T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.01958
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01973
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01943
published_at 2026-04-12T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.01937
published_at 2026-04-13T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01917
published_at 2026-04-18T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02001
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033
reference_id 1043033
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224367
reference_id 2224367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224367
6
reference_url https://access.redhat.com/errata/RHSA-2023:6544
reference_id RHSA-2023:6544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6544
7
reference_url https://access.redhat.com/errata/RHSA-2023:7053
reference_id RHSA-2023:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7053
8
reference_url https://usn.ubuntu.com/6297-1/
reference_id USN-6297-1
reference_type
scores
url https://usn.ubuntu.com/6297-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2023-38559
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trcm-319g-5qhu
42
url VCID-ue85-9uqn-xye4
vulnerability_id VCID-ue85-9uqn-xye4
summary ghostscript: use-after-free in sampled_data_sample may lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45944.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45944.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45944
reference_id
reference_type
scores
0
value 0.01226
scoring_system epss
scoring_elements 0.79078
published_at 2026-04-01T12:55:00Z
1
value 0.01226
scoring_system epss
scoring_elements 0.79085
published_at 2026-04-02T12:55:00Z
2
value 0.01226
scoring_system epss
scoring_elements 0.79112
published_at 2026-04-04T12:55:00Z
3
value 0.01226
scoring_system epss
scoring_elements 0.79097
published_at 2026-04-07T12:55:00Z
4
value 0.01226
scoring_system epss
scoring_elements 0.79122
published_at 2026-04-08T12:55:00Z
5
value 0.01226
scoring_system epss
scoring_elements 0.79129
published_at 2026-04-09T12:55:00Z
6
value 0.01226
scoring_system epss
scoring_elements 0.79154
published_at 2026-04-18T12:55:00Z
7
value 0.01226
scoring_system epss
scoring_elements 0.7914
published_at 2026-04-12T12:55:00Z
8
value 0.01226
scoring_system epss
scoring_elements 0.7913
published_at 2026-04-13T12:55:00Z
9
value 0.01226
scoring_system epss
scoring_elements 0.79157
published_at 2026-04-16T12:55:00Z
10
value 0.01226
scoring_system epss
scoring_elements 0.79153
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45944
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2048916
reference_id 2048916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2048916
6
reference_url https://usn.ubuntu.com/5224-1/
reference_id USN-5224-1
reference_type
scores
url https://usn.ubuntu.com/5224-1/
7
reference_url https://usn.ubuntu.com/5224-2/
reference_id USN-5224-2
reference_type
scores
url https://usn.ubuntu.com/5224-2/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2021-45944
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ue85-9uqn-xye4
43
url VCID-uryu-n1p2-mugy
vulnerability_id VCID-uryu-n1p2-mugy
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16308.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16308
reference_id
reference_type
scores
0
value 0.01091
scoring_system epss
scoring_elements 0.77888
published_at 2026-04-01T12:55:00Z
1
value 0.01091
scoring_system epss
scoring_elements 0.77895
published_at 2026-04-02T12:55:00Z
2
value 0.01091
scoring_system epss
scoring_elements 0.77923
published_at 2026-04-04T12:55:00Z
3
value 0.01091
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-07T12:55:00Z
4
value 0.01091
scoring_system epss
scoring_elements 0.77933
published_at 2026-04-08T12:55:00Z
5
value 0.01091
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-09T12:55:00Z
6
value 0.01091
scoring_system epss
scoring_elements 0.77963
published_at 2026-04-11T12:55:00Z
7
value 0.01091
scoring_system epss
scoring_elements 0.77948
published_at 2026-04-12T12:55:00Z
8
value 0.01091
scoring_system epss
scoring_elements 0.77947
published_at 2026-04-13T12:55:00Z
9
value 0.01091
scoring_system epss
scoring_elements 0.77982
published_at 2026-04-16T12:55:00Z
10
value 0.01091
scoring_system epss
scoring_elements 0.77981
published_at 2026-04-18T12:55:00Z
11
value 0.01091
scoring_system epss
scoring_elements 0.77974
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870256
reference_id 1870256
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870256
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16308
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uryu-n1p2-mugy
44
url VCID-vkxy-8vep-x7bg
vulnerability_id VCID-vkxy-8vep-x7bg
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33
reference_id
reference_type
scores
url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
3
reference_url https://access.redhat.com/errata/RHBA-2019:2824
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:2824
4
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2594
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14813.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14813.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14813
reference_id
reference_type
scores
0
value 0.08454
scoring_system epss
scoring_elements 0.92315
published_at 2026-04-01T12:55:00Z
1
value 0.08454
scoring_system epss
scoring_elements 0.92363
published_at 2026-04-18T12:55:00Z
2
value 0.08454
scoring_system epss
scoring_elements 0.92343
published_at 2026-04-08T12:55:00Z
3
value 0.08454
scoring_system epss
scoring_elements 0.92348
published_at 2026-04-09T12:55:00Z
4
value 0.08454
scoring_system epss
scoring_elements 0.92353
published_at 2026-04-13T12:55:00Z
5
value 0.08454
scoring_system epss
scoring_elements 0.92355
published_at 2026-04-12T12:55:00Z
6
value 0.08454
scoring_system epss
scoring_elements 0.92364
published_at 2026-04-21T12:55:00Z
7
value 0.08454
scoring_system epss
scoring_elements 0.92322
published_at 2026-04-02T12:55:00Z
8
value 0.08454
scoring_system epss
scoring_elements 0.92328
published_at 2026-04-04T12:55:00Z
9
value 0.08454
scoring_system epss
scoring_elements 0.92332
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14813
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
17
reference_url https://seclists.org/bugtraq/2019/Sep/15
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/15
18
reference_url https://www.debian.org/security/2019/dsa-4518
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4518
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743737
reference_id 1743737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743737
20
reference_url https://security.archlinux.org/ASA-201911-5
reference_id ASA-201911-5
reference_type
scores
url https://security.archlinux.org/ASA-201911-5
21
reference_url https://security.archlinux.org/AVG-1031
reference_id AVG-1031
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1031
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14813
reference_id CVE-2019-14813
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14813
42
reference_url https://security.gentoo.org/glsa/202004-03
reference_id GLSA-202004-03
reference_type
scores
url https://security.gentoo.org/glsa/202004-03
43
reference_url https://access.redhat.com/errata/RHSA-2019:2534
reference_id RHSA-2019:2534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2534
44
reference_url https://access.redhat.com/errata/RHSA-2019:2586
reference_id RHSA-2019:2586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2586
45
reference_url https://access.redhat.com/errata/RHSA-2019:2591
reference_id RHSA-2019:2591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2591
46
reference_url https://usn.ubuntu.com/4111-1/
reference_id USN-4111-1
reference_type
scores
url https://usn.ubuntu.com/4111-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
purl pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-2ypb-qhkv-1yfe
4
vulnerability VCID-3gax-xvqu-ykhh
5
vulnerability VCID-3sxw-86yd-gqe1
6
vulnerability VCID-479g-vu9e-1ygz
7
vulnerability VCID-4eac-yk5k-mueh
8
vulnerability VCID-4grr-m9cp-x3fm
9
vulnerability VCID-4h4k-fmtp-j7bg
10
vulnerability VCID-4zba-5tgb-nufd
11
vulnerability VCID-6zft-uqxb-pkh2
12
vulnerability VCID-79q2-phm8-e7cv
13
vulnerability VCID-7anb-rnxg-97h8
14
vulnerability VCID-7ap3-6gs2-fbgs
15
vulnerability VCID-7u9a-5pkt-4fbf
16
vulnerability VCID-8hfa-4qua-tuab
17
vulnerability VCID-8wed-eqxt-pygs
18
vulnerability VCID-8wfs-knnp-8ub1
19
vulnerability VCID-95yj-ph8u-2fbq
20
vulnerability VCID-ae31-n66y-akcg
21
vulnerability VCID-b1zp-sfch-u3c1
22
vulnerability VCID-barv-t623-h3e5
23
vulnerability VCID-bnpf-udu2-hqbk
24
vulnerability VCID-c6ms-5wr2-kbfj
25
vulnerability VCID-e8bh-th45-vfgg
26
vulnerability VCID-eqhh-t7qd-vuav
27
vulnerability VCID-eypv-n5ea-abgn
28
vulnerability VCID-fehm-g4fq-pfb2
29
vulnerability VCID-ge8e-fm7t-gqgj
30
vulnerability VCID-gjj2-k1mt-sbgv
31
vulnerability VCID-gv9z-e7t9-m7g6
32
vulnerability VCID-h7py-se4n-6bdy
33
vulnerability VCID-hc8b-qzqp-pqdn
34
vulnerability VCID-ht37-jj18-t3c5
35
vulnerability VCID-hy2v-rkzm-nka1
36
vulnerability VCID-k2rj-x3d7-ryd2
37
vulnerability VCID-kd8x-74zr-e7dd
38
vulnerability VCID-kjpt-6dws-9ufd
39
vulnerability VCID-kk8v-381v-sybr
40
vulnerability VCID-kw3r-f2mb-cyf6
41
vulnerability VCID-mg71-sbsj-2yam
42
vulnerability VCID-mqgf-gbdy-4uav
43
vulnerability VCID-mr6f-95kb-wfhf
44
vulnerability VCID-n8rh-znkz-tfdt
45
vulnerability VCID-nhtp-m11f-xuh6
46
vulnerability VCID-nsan-3rne-7fbw
47
vulnerability VCID-pjph-6muk-aff3
48
vulnerability VCID-pnwf-fw4h-r3g3
49
vulnerability VCID-pvfx-6ymq-6qbf
50
vulnerability VCID-q9by-9s2x-z3au
51
vulnerability VCID-qvq2-xbp6-m3fy
52
vulnerability VCID-s9t8-smvb-wkd4
53
vulnerability VCID-sj4u-xzg3-z3hf
54
vulnerability VCID-snzm-pkb8-9fcp
55
vulnerability VCID-thz5-yhwy-63fc
56
vulnerability VCID-tp6u-sxuv-a3a6
57
vulnerability VCID-trcm-319g-5qhu
58
vulnerability VCID-ue85-9uqn-xye4
59
vulnerability VCID-uryu-n1p2-mugy
60
vulnerability VCID-vkxy-8vep-x7bg
61
vulnerability VCID-vw3z-bxb8-qkdq
62
vulnerability VCID-wtv2-9jx7-kkgz
63
vulnerability VCID-x5ce-v7bc-ufam
64
vulnerability VCID-x6p8-v4bm-nqhs
65
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6
1
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
2
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2019-14813
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkxy-8vep-x7bg
45
url VCID-vw3z-bxb8-qkdq
vulnerability_id VCID-vw3z-bxb8-qkdq
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16301.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16301
reference_id
reference_type
scores
0
value 0.00805
scoring_system epss
scoring_elements 0.74097
published_at 2026-04-01T12:55:00Z
1
value 0.00805
scoring_system epss
scoring_elements 0.74102
published_at 2026-04-02T12:55:00Z
2
value 0.00805
scoring_system epss
scoring_elements 0.74128
published_at 2026-04-04T12:55:00Z
3
value 0.00805
scoring_system epss
scoring_elements 0.741
published_at 2026-04-07T12:55:00Z
4
value 0.00805
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-08T12:55:00Z
5
value 0.00805
scoring_system epss
scoring_elements 0.74148
published_at 2026-04-09T12:55:00Z
6
value 0.00805
scoring_system epss
scoring_elements 0.74169
published_at 2026-04-11T12:55:00Z
7
value 0.00805
scoring_system epss
scoring_elements 0.74151
published_at 2026-04-12T12:55:00Z
8
value 0.00805
scoring_system epss
scoring_elements 0.74144
published_at 2026-04-13T12:55:00Z
9
value 0.00805
scoring_system epss
scoring_elements 0.74182
published_at 2026-04-21T12:55:00Z
10
value 0.00805
scoring_system epss
scoring_elements 0.7419
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16301
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870167
reference_id 1870167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870167
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16301
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vw3z-bxb8-qkdq
46
url VCID-x6p8-v4bm-nqhs
vulnerability_id VCID-x6p8-v4bm-nqhs
summary ghostscript: heap-based buffer overflow in sampled_data_finish
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45949.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45949.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45949
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20214
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20363
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20423
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20147
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20228
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20287
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20315
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20269
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.2021
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-21T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20875
published_at 2026-04-16T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20876
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45949
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2048939
reference_id 2048939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2048939
6
reference_url https://usn.ubuntu.com/5224-1/
reference_id USN-5224-1
reference_type
scores
url https://usn.ubuntu.com/5224-1/
7
reference_url https://usn.ubuntu.com/5224-2/
reference_id USN-5224-2
reference_type
scores
url https://usn.ubuntu.com/5224-2/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2021-45949
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6p8-v4bm-nqhs
47
url VCID-xg1d-bc8m-v7eg
vulnerability_id VCID-xg1d-bc8m-v7eg
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16289.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16289.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16289
reference_id
reference_type
scores
0
value 0.01421
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-01T12:55:00Z
1
value 0.01421
scoring_system epss
scoring_elements 0.80541
published_at 2026-04-02T12:55:00Z
2
value 0.01421
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-04T12:55:00Z
3
value 0.01421
scoring_system epss
scoring_elements 0.80556
published_at 2026-04-07T12:55:00Z
4
value 0.01421
scoring_system epss
scoring_elements 0.80585
published_at 2026-04-08T12:55:00Z
5
value 0.01421
scoring_system epss
scoring_elements 0.80594
published_at 2026-04-09T12:55:00Z
6
value 0.01421
scoring_system epss
scoring_elements 0.80611
published_at 2026-04-11T12:55:00Z
7
value 0.01421
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-12T12:55:00Z
8
value 0.01421
scoring_system epss
scoring_elements 0.8059
published_at 2026-04-13T12:55:00Z
9
value 0.01421
scoring_system epss
scoring_elements 0.80619
published_at 2026-04-16T12:55:00Z
10
value 0.01421
scoring_system epss
scoring_elements 0.80622
published_at 2026-04-18T12:55:00Z
11
value 0.01421
scoring_system epss
scoring_elements 0.80625
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16289
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1870244
reference_id 1870244
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1870244
29
reference_url https://security.gentoo.org/glsa/202008-20
reference_id GLSA-202008-20
reference_type
scores
url https://security.gentoo.org/glsa/202008-20
30
reference_url https://access.redhat.com/errata/RHSA-2021:1852
reference_id RHSA-2021:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1852
31
reference_url https://usn.ubuntu.com/4469-1/
reference_id USN-4469-1
reference_type
scores
url https://usn.ubuntu.com/4469-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
purl pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-16fp-tdk6-sfcc
1
vulnerability VCID-1xn6-drde-gkd4
2
vulnerability VCID-2ncr-54s7-hqfz
3
vulnerability VCID-3gax-xvqu-ykhh
4
vulnerability VCID-3sxw-86yd-gqe1
5
vulnerability VCID-479g-vu9e-1ygz
6
vulnerability VCID-4eac-yk5k-mueh
7
vulnerability VCID-4grr-m9cp-x3fm
8
vulnerability VCID-4h4k-fmtp-j7bg
9
vulnerability VCID-4zba-5tgb-nufd
10
vulnerability VCID-79q2-phm8-e7cv
11
vulnerability VCID-7anb-rnxg-97h8
12
vulnerability VCID-7ap3-6gs2-fbgs
13
vulnerability VCID-7u9a-5pkt-4fbf
14
vulnerability VCID-8wed-eqxt-pygs
15
vulnerability VCID-8wfs-knnp-8ub1
16
vulnerability VCID-95yj-ph8u-2fbq
17
vulnerability VCID-ae31-n66y-akcg
18
vulnerability VCID-b1zp-sfch-u3c1
19
vulnerability VCID-barv-t623-h3e5
20
vulnerability VCID-bnpf-udu2-hqbk
21
vulnerability VCID-c6ms-5wr2-kbfj
22
vulnerability VCID-e8bh-th45-vfgg
23
vulnerability VCID-eqhh-t7qd-vuav
24
vulnerability VCID-eypv-n5ea-abgn
25
vulnerability VCID-fehm-g4fq-pfb2
26
vulnerability VCID-ge8e-fm7t-gqgj
27
vulnerability VCID-gv9z-e7t9-m7g6
28
vulnerability VCID-h7py-se4n-6bdy
29
vulnerability VCID-hc8b-qzqp-pqdn
30
vulnerability VCID-ht37-jj18-t3c5
31
vulnerability VCID-hy2v-rkzm-nka1
32
vulnerability VCID-k2rj-x3d7-ryd2
33
vulnerability VCID-kd8x-74zr-e7dd
34
vulnerability VCID-kjpt-6dws-9ufd
35
vulnerability VCID-kw3r-f2mb-cyf6
36
vulnerability VCID-mg71-sbsj-2yam
37
vulnerability VCID-mqgf-gbdy-4uav
38
vulnerability VCID-mr6f-95kb-wfhf
39
vulnerability VCID-n8rh-znkz-tfdt
40
vulnerability VCID-nhtp-m11f-xuh6
41
vulnerability VCID-nsan-3rne-7fbw
42
vulnerability VCID-pjph-6muk-aff3
43
vulnerability VCID-pnwf-fw4h-r3g3
44
vulnerability VCID-pvfx-6ymq-6qbf
45
vulnerability VCID-q9by-9s2x-z3au
46
vulnerability VCID-qvq2-xbp6-m3fy
47
vulnerability VCID-s9t8-smvb-wkd4
48
vulnerability VCID-sj4u-xzg3-z3hf
49
vulnerability VCID-snzm-pkb8-9fcp
50
vulnerability VCID-thz5-yhwy-63fc
51
vulnerability VCID-tp6u-sxuv-a3a6
52
vulnerability VCID-trcm-319g-5qhu
53
vulnerability VCID-ue85-9uqn-xye4
54
vulnerability VCID-uryu-n1p2-mugy
55
vulnerability VCID-vkxy-8vep-x7bg
56
vulnerability VCID-vw3z-bxb8-qkdq
57
vulnerability VCID-wtv2-9jx7-kkgz
58
vulnerability VCID-x5ce-v7bc-ufam
59
vulnerability VCID-x6p8-v4bm-nqhs
60
vulnerability VCID-xg1d-bc8m-v7eg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-7anb-rnxg-97h8
2
vulnerability VCID-7u9a-5pkt-4fbf
3
vulnerability VCID-8wfs-knnp-8ub1
4
vulnerability VCID-barv-t623-h3e5
5
vulnerability VCID-bnpf-udu2-hqbk
6
vulnerability VCID-c6ms-5wr2-kbfj
7
vulnerability VCID-eypv-n5ea-abgn
8
vulnerability VCID-gv9z-e7t9-m7g6
9
vulnerability VCID-j6nh-rfbg-z7f7
10
vulnerability VCID-k2rj-x3d7-ryd2
11
vulnerability VCID-k837-n44h-pkbm
12
vulnerability VCID-pnwf-fw4h-r3g3
13
vulnerability VCID-pvfx-6ymq-6qbf
14
vulnerability VCID-rdmp-hfbg-2kh5
15
vulnerability VCID-t3n4-wrgr-bkdy
16
vulnerability VCID-wtv2-9jx7-kkgz
17
vulnerability VCID-wzad-uxqp-63h3
18
vulnerability VCID-x5ce-v7bc-ufam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7
aliases CVE-2020-16289
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xg1d-bc8m-v7eg
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7