Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
Typedeb
Namespacedebian
Namecups-filters
Version1.11.6-3+deb9u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.28.17-3+deb12u2
Latest_non_vulnerable_version1.28.17-3+deb12u2
Affected_by_vulnerabilities
0
url VCID-6qd1-jvb8-jqak
vulnerability_id VCID-6qd1-jvb8-jqak
summary cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64503
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06713
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06652
published_at 2026-04-11T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-12T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06637
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06564
published_at 2026-04-16T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06556
published_at 2026-04-18T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14926
published_at 2026-04-04T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14849
published_at 2026-04-02T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14874
published_at 2026-04-09T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14819
published_at 2026-04-08T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14728
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697
reference_id 1120697
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698
reference_id 1120698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414705
reference_id 2414705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414705
7
reference_url https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865
reference_id 50d94ca0f2fa6177613c97c59791bde568631865
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865
8
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9
reference_id GHSA-893j-2wr2-wrh9
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9
9
reference_url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620
reference_id pdftoraster.cxx#L1620
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620
10
reference_url https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790
reference_id pdftoraster.cxx#L1790
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790
11
reference_url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880
reference_id pdftoraster.cxx#L1880
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880
12
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
13
reference_url https://usn.ubuntu.com/7877-1/
reference_id USN-7877-1
reference_type
scores
url https://usn.ubuntu.com/7877-1/
14
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2025-64503
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qd1-jvb8-jqak
1
url VCID-7xq5-z572-xub3
vulnerability_id VCID-7xq5-z572-xub3
summary cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57812
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04222
published_at 2026-04-21T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04165
published_at 2026-04-11T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04148
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04123
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04094
published_at 2026-04-16T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-18T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15646
published_at 2026-04-04T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15579
published_at 2026-04-02T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15589
published_at 2026-04-09T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15534
published_at 2026-04-08T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703
reference_id 1120703
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704
reference_id 1120704
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414632
reference_id 2414632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414632
7
reference_url https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa
reference_id b69dfacec7f176281782e2f7ac44f04bf9633cfa
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa
8
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4
reference_id GHSA-jpxg-qc2c-hgv4
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4
9
reference_url https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32
reference_id image-tiff.c#L32
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32
10
reference_url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34
reference_id image-tiff.c#L34
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34
11
reference_url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613
reference_id imagetoraster.c#L613
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613
12
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
13
reference_url https://usn.ubuntu.com/7877-1/
reference_id USN-7877-1
reference_type
scores
url https://usn.ubuntu.com/7877-1/
14
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2025-57812
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xq5-z572-xub3
2
url VCID-f6n6-k5ye-3ugq
vulnerability_id VCID-f6n6-k5ye-3ugq
summary cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47076
reference_id
reference_type
scores
0
value 0.73875
scoring_system epss
scoring_elements 0.98827
published_at 2026-04-18T12:55:00Z
1
value 0.73875
scoring_system epss
scoring_elements 0.98825
published_at 2026-04-16T12:55:00Z
2
value 0.73875
scoring_system epss
scoring_elements 0.98821
published_at 2026-04-13T12:55:00Z
3
value 0.73875
scoring_system epss
scoring_elements 0.9882
published_at 2026-04-12T12:55:00Z
4
value 0.73875
scoring_system epss
scoring_elements 0.98819
published_at 2026-04-11T12:55:00Z
5
value 0.73875
scoring_system epss
scoring_elements 0.98817
published_at 2026-04-09T12:55:00Z
6
value 0.73875
scoring_system epss
scoring_elements 0.98813
published_at 2026-04-04T12:55:00Z
7
value 0.73875
scoring_system epss
scoring_elements 0.98816
published_at 2026-04-07T12:55:00Z
8
value 0.74242
scoring_system epss
scoring_elements 0.98849
published_at 2026-04-21T12:55:00Z
9
value 0.74242
scoring_system epss
scoring_elements 0.9883
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47076
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821
reference_id 1082821
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827
reference_id 1082827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314253
reference_id 2314253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314253
7
reference_url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
reference_id Attacking-UNIX-systems-via-CUPS-Part-I
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
8
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
reference_id GHSA-7xfx-47qg-grp6
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
9
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
reference_id GHSA-p9rh-jxmq-gq47
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
10
reference_url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
reference_id GHSA-rj88-6mr5-rcw8
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
11
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
reference_id GHSA-w63j-6g73-wmg5
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
12
reference_url https://access.redhat.com/errata/RHSA-2024:7346
reference_id RHSA-2024:7346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7346
13
reference_url https://access.redhat.com/errata/RHSA-2024:7461
reference_id RHSA-2024:7461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7461
14
reference_url https://access.redhat.com/errata/RHSA-2024:7462
reference_id RHSA-2024:7462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7462
15
reference_url https://access.redhat.com/errata/RHSA-2024:7463
reference_id RHSA-2024:7463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7463
16
reference_url https://access.redhat.com/errata/RHSA-2024:7503
reference_id RHSA-2024:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7503
17
reference_url https://access.redhat.com/errata/RHSA-2024:7504
reference_id RHSA-2024:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7504
18
reference_url https://access.redhat.com/errata/RHSA-2024:7506
reference_id RHSA-2024:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7506
19
reference_url https://access.redhat.com/errata/RHSA-2024:7551
reference_id RHSA-2024:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7551
20
reference_url https://access.redhat.com/errata/RHSA-2024:7553
reference_id RHSA-2024:7553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7553
21
reference_url https://access.redhat.com/errata/RHSA-2024:7623
reference_id RHSA-2024:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7623
22
reference_url https://usn.ubuntu.com/7043-1/
reference_id USN-7043-1
reference_type
scores
url https://usn.ubuntu.com/7043-1/
23
reference_url https://usn.ubuntu.com/7043-4/
reference_id USN-7043-4
reference_type
scores
url https://usn.ubuntu.com/7043-4/
24
reference_url https://usn.ubuntu.com/7044-1/
reference_id USN-7044-1
reference_type
scores
url https://usn.ubuntu.com/7044-1/
25
reference_url https://www.cups.org
reference_id www.cups.org
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://www.cups.org
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2024-47076
risk_score 10.0
exploitability 2.0
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6n6-k5ye-3ugq
3
url VCID-jvcy-2qyh-jqg4
vulnerability_id VCID-jvcy-2qyh-jqg4
summary cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47176
reference_id
reference_type
scores
0
value 0.87039
scoring_system epss
scoring_elements 0.99443
published_at 2026-04-21T12:55:00Z
1
value 0.87039
scoring_system epss
scoring_elements 0.99434
published_at 2026-04-02T12:55:00Z
2
value 0.87593
scoring_system epss
scoring_elements 0.99462
published_at 2026-04-09T12:55:00Z
3
value 0.87593
scoring_system epss
scoring_elements 0.99461
published_at 2026-04-08T12:55:00Z
4
value 0.87593
scoring_system epss
scoring_elements 0.99468
published_at 2026-04-18T12:55:00Z
5
value 0.87593
scoring_system epss
scoring_elements 0.99467
published_at 2026-04-16T12:55:00Z
6
value 0.87593
scoring_system epss
scoring_elements 0.99464
published_at 2026-04-13T12:55:00Z
7
value 0.87593
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-11T12:55:00Z
8
value 0.87593
scoring_system epss
scoring_elements 0.99458
published_at 2026-04-04T12:55:00Z
9
value 0.87593
scoring_system epss
scoring_elements 0.9946
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820
reference_id 1082820
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314252
reference_id 2314252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314252
6
reference_url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
reference_id Attacking-UNIX-systems-via-CUPS-Part-I
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
7
reference_url https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992
reference_id cups-browsed.c#L13992
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992
8
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
reference_id GHSA-7xfx-47qg-grp6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
9
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
reference_id GHSA-p9rh-jxmq-gq47
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
10
reference_url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
reference_id GHSA-rj88-6mr5-rcw8
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
11
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
reference_id GHSA-w63j-6g73-wmg5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
12
reference_url https://access.redhat.com/errata/RHSA-2024:7346
reference_id RHSA-2024:7346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7346
13
reference_url https://access.redhat.com/errata/RHSA-2024:7461
reference_id RHSA-2024:7461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7461
14
reference_url https://access.redhat.com/errata/RHSA-2024:7462
reference_id RHSA-2024:7462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7462
15
reference_url https://access.redhat.com/errata/RHSA-2024:7463
reference_id RHSA-2024:7463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7463
16
reference_url https://access.redhat.com/errata/RHSA-2024:7503
reference_id RHSA-2024:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7503
17
reference_url https://access.redhat.com/errata/RHSA-2024:7504
reference_id RHSA-2024:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7504
18
reference_url https://access.redhat.com/errata/RHSA-2024:7506
reference_id RHSA-2024:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7506
19
reference_url https://access.redhat.com/errata/RHSA-2024:7551
reference_id RHSA-2024:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7551
20
reference_url https://access.redhat.com/errata/RHSA-2024:7553
reference_id RHSA-2024:7553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7553
21
reference_url https://access.redhat.com/errata/RHSA-2024:7623
reference_id RHSA-2024:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7623
22
reference_url https://usn.ubuntu.com/7042-1/
reference_id USN-7042-1
reference_type
scores
url https://usn.ubuntu.com/7042-1/
23
reference_url https://usn.ubuntu.com/7042-2/
reference_id USN-7042-2
reference_type
scores
url https://usn.ubuntu.com/7042-2/
24
reference_url https://usn.ubuntu.com/7042-3/
reference_id USN-7042-3
reference_type
scores
url https://usn.ubuntu.com/7042-3/
25
reference_url https://usn.ubuntu.com/7043-1/
reference_id USN-7043-1
reference_type
scores
url https://usn.ubuntu.com/7043-1/
26
reference_url https://usn.ubuntu.com/7043-2/
reference_id USN-7043-2
reference_type
scores
url https://usn.ubuntu.com/7043-2/
27
reference_url https://usn.ubuntu.com/7043-3/
reference_id USN-7043-3
reference_type
scores
url https://usn.ubuntu.com/7043-3/
28
reference_url https://usn.ubuntu.com/7043-4/
reference_id USN-7043-4
reference_type
scores
url https://usn.ubuntu.com/7043-4/
29
reference_url https://www.cups.org
reference_id www.cups.org
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://www.cups.org
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2024-47176
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvcy-2qyh-jqg4
4
url VCID-rcep-az2v-1yab
vulnerability_id VCID-rcep-az2v-1yab
summary cups-filters: cups-filters: Heap buffer overflow in rastertopclx filter may lead arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64524
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-18T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09791
published_at 2026-04-02T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09865
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09873
published_at 2026-04-11T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09837
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09821
published_at 2026-04-13T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09703
published_at 2026-04-16T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09841
published_at 2026-04-04T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09742
published_at 2026-04-07T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09813
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414780
reference_id 2414780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414780
5
reference_url https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06
reference_id 956283c74a34ae924266a2a63f8e5f529a1abd06
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/
url https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06
6
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv
reference_id GHSA-rq44-2q5p-x3hv
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv
7
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
8
reference_url https://usn.ubuntu.com/7878-2/
reference_id USN-7878-2
reference_type
scores
url https://usn.ubuntu.com/7878-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2025-64524
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcep-az2v-1yab
5
url VCID-vzgv-8drt-8yd5
vulnerability_id VCID-vzgv-8drt-8yd5
summary A vulnerability has been found in CUPS filters where remote code execution is possible via the beh filter.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24805.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-24805
reference_id
reference_type
scores
0
value 0.08929
scoring_system epss
scoring_elements 0.92555
published_at 2026-04-02T12:55:00Z
1
value 0.08929
scoring_system epss
scoring_elements 0.92562
published_at 2026-04-04T12:55:00Z
2
value 0.08929
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-07T12:55:00Z
3
value 0.08929
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-08T12:55:00Z
4
value 0.08929
scoring_system epss
scoring_elements 0.9258
published_at 2026-04-09T12:55:00Z
5
value 0.08929
scoring_system epss
scoring_elements 0.92599
published_at 2026-04-16T12:55:00Z
6
value 0.08929
scoring_system epss
scoring_elements 0.92598
published_at 2026-04-18T12:55:00Z
7
value 0.08929
scoring_system epss
scoring_elements 0.92586
published_at 2026-04-13T12:55:00Z
8
value 0.08929
scoring_system epss
scoring_elements 0.92587
published_at 2026-04-12T12:55:00Z
9
value 0.10242
scoring_system epss
scoring_elements 0.93177
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-24805
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036224
reference_id 1036224
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036224
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2203051
reference_id 2203051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2203051
6
reference_url https://security.gentoo.org/glsa/202401-06
reference_id GLSA-202401-06
reference_type
scores
url https://security.gentoo.org/glsa/202401-06
7
reference_url https://access.redhat.com/errata/RHSA-2023:3423
reference_id RHSA-2023:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3423
8
reference_url https://access.redhat.com/errata/RHSA-2023:3424
reference_id RHSA-2023:3424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3424
9
reference_url https://access.redhat.com/errata/RHSA-2023:3425
reference_id RHSA-2023:3425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3425
10
reference_url https://access.redhat.com/errata/RHSA-2023:3426
reference_id RHSA-2023:3426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3426
11
reference_url https://access.redhat.com/errata/RHSA-2023:3427
reference_id RHSA-2023:3427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3427
12
reference_url https://access.redhat.com/errata/RHSA-2023:3428
reference_id RHSA-2023:3428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3428
13
reference_url https://access.redhat.com/errata/RHSA-2023:3429
reference_id RHSA-2023:3429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3429
14
reference_url https://usn.ubuntu.com/6083-1/
reference_id USN-6083-1
reference_type
scores
url https://usn.ubuntu.com/6083-1/
15
reference_url https://usn.ubuntu.com/6083-2/
reference_id USN-6083-2
reference_type
scores
url https://usn.ubuntu.com/6083-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qd1-jvb8-jqak
1
vulnerability VCID-7xq5-z572-xub3
2
vulnerability VCID-f6n6-k5ye-3ugq
3
vulnerability VCID-jvcy-2qyh-jqg4
4
vulnerability VCID-rcep-az2v-1yab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2
aliases CVE-2023-24805
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzgv-8drt-8yd5
Fixing_vulnerabilities
0
url VCID-3317-h26p-43ef
vulnerability_id VCID-3317-h26p-43ef
summary security update
references
0
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
1
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0491.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0491.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8327.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8327.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8327
reference_id
reference_type
scores
0
value 0.2071
scoring_system epss
scoring_elements 0.95607
published_at 2026-04-21T12:55:00Z
1
value 0.2071
scoring_system epss
scoring_elements 0.95608
published_at 2026-04-18T12:55:00Z
2
value 0.2071
scoring_system epss
scoring_elements 0.9556
published_at 2026-04-01T12:55:00Z
3
value 0.2071
scoring_system epss
scoring_elements 0.95569
published_at 2026-04-02T12:55:00Z
4
value 0.2071
scoring_system epss
scoring_elements 0.95574
published_at 2026-04-04T12:55:00Z
5
value 0.2071
scoring_system epss
scoring_elements 0.95577
published_at 2026-04-07T12:55:00Z
6
value 0.2071
scoring_system epss
scoring_elements 0.95584
published_at 2026-04-08T12:55:00Z
7
value 0.2071
scoring_system epss
scoring_elements 0.95587
published_at 2026-04-09T12:55:00Z
8
value 0.2071
scoring_system epss
scoring_elements 0.95591
published_at 2026-04-11T12:55:00Z
9
value 0.2071
scoring_system epss
scoring_elements 0.95592
published_at 2026-04-12T12:55:00Z
10
value 0.2071
scoring_system epss
scoring_elements 0.95594
published_at 2026-04-13T12:55:00Z
11
value 0.2071
scoring_system epss
scoring_elements 0.95602
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8327
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.debian.org/debian-printing/2015/11/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-printing/2015/11/msg00020.html
11
reference_url https://lists.debian.org/debian-printing/2015/12/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-printing/2015/12/msg00001.html
12
reference_url http://www.debian.org/security/2015/dsa-3411
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3411
13
reference_url http://www.debian.org/security/2015/dsa-3429
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3429
14
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
15
reference_url http://www.securityfocus.com/bid/78524
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/78524
16
reference_url http://www.ubuntu.com/usn/USN-2831-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2831-1
17
reference_url http://www.ubuntu.com/usn/USN-2831-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2831-2
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287523
reference_id 1287523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287523
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8327
reference_id CVE-2015-8327
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8327
84
reference_url https://access.redhat.com/errata/RHSA-2016:0491
reference_id RHSA-2016:0491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0491
85
reference_url https://usn.ubuntu.com/2831-1/
reference_id USN-2831-1
reference_type
scores
url https://usn.ubuntu.com/2831-1/
86
reference_url https://usn.ubuntu.com/2831-2/
reference_id USN-2831-2
reference_type
scores
url https://usn.ubuntu.com/2831-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3
purl pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3317-h26p-43ef
1
vulnerability VCID-39f1-22a5-c7aw
2
vulnerability VCID-6qd1-jvb8-jqak
3
vulnerability VCID-7xq5-z572-xub3
4
vulnerability VCID-9dsn-96eh-bbh4
5
vulnerability VCID-ed99-uccv-d7bh
6
vulnerability VCID-f6n6-k5ye-3ugq
7
vulnerability VCID-jvcy-2qyh-jqg4
8
vulnerability VCID-rcep-az2v-1yab
9
vulnerability VCID-uz2u-k3vm-w3c2
10
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%252Bdeb8u3
1
url pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
purl pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qd1-jvb8-jqak
1
vulnerability VCID-7xq5-z572-xub3
2
vulnerability VCID-f6n6-k5ye-3ugq
3
vulnerability VCID-jvcy-2qyh-jqg4
4
vulnerability VCID-rcep-az2v-1yab
5
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1
aliases CVE-2015-8327
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3317-h26p-43ef
1
url VCID-39f1-22a5-c7aw
vulnerability_id VCID-39f1-22a5-c7aw
summary
Multiple vulnerabilities have been found in cups-filters, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3258
reference_id
reference_type
scores
0
value 0.37078
scoring_system epss
scoring_elements 0.97131
published_at 2026-04-01T12:55:00Z
1
value 0.37078
scoring_system epss
scoring_elements 0.97138
published_at 2026-04-02T12:55:00Z
2
value 0.37078
scoring_system epss
scoring_elements 0.97144
published_at 2026-04-04T12:55:00Z
3
value 0.37078
scoring_system epss
scoring_elements 0.97145
published_at 2026-04-07T12:55:00Z
4
value 0.37078
scoring_system epss
scoring_elements 0.97154
published_at 2026-04-08T12:55:00Z
5
value 0.37078
scoring_system epss
scoring_elements 0.97155
published_at 2026-04-09T12:55:00Z
6
value 0.37078
scoring_system epss
scoring_elements 0.97159
published_at 2026-04-11T12:55:00Z
7
value 0.37078
scoring_system epss
scoring_elements 0.9716
published_at 2026-04-12T12:55:00Z
8
value 0.37078
scoring_system epss
scoring_elements 0.97161
published_at 2026-04-13T12:55:00Z
9
value 0.37078
scoring_system epss
scoring_elements 0.97169
published_at 2026-04-16T12:55:00Z
10
value 0.37078
scoring_system epss
scoring_elements 0.9717
published_at 2026-04-18T12:55:00Z
11
value 0.37078
scoring_system epss
scoring_elements 0.97174
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3258
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1235385
reference_id 1235385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1235385
5
reference_url https://security.gentoo.org/glsa/201510-08
reference_id GLSA-201510-08
reference_type
scores
url https://security.gentoo.org/glsa/201510-08
6
reference_url https://access.redhat.com/errata/RHSA-2015:2360
reference_id RHSA-2015:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2360
7
reference_url https://usn.ubuntu.com/2659-1/
reference_id USN-2659-1
reference_type
scores
url https://usn.ubuntu.com/2659-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3
purl pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3317-h26p-43ef
1
vulnerability VCID-39f1-22a5-c7aw
2
vulnerability VCID-6qd1-jvb8-jqak
3
vulnerability VCID-7xq5-z572-xub3
4
vulnerability VCID-9dsn-96eh-bbh4
5
vulnerability VCID-ed99-uccv-d7bh
6
vulnerability VCID-f6n6-k5ye-3ugq
7
vulnerability VCID-jvcy-2qyh-jqg4
8
vulnerability VCID-rcep-az2v-1yab
9
vulnerability VCID-uz2u-k3vm-w3c2
10
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%252Bdeb8u3
1
url pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
purl pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qd1-jvb8-jqak
1
vulnerability VCID-7xq5-z572-xub3
2
vulnerability VCID-f6n6-k5ye-3ugq
3
vulnerability VCID-jvcy-2qyh-jqg4
4
vulnerability VCID-rcep-az2v-1yab
5
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1
aliases CVE-2015-3258
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw
2
url VCID-9dsn-96eh-bbh4
vulnerability_id VCID-9dsn-96eh-bbh4
summary regression update
references
fixed_packages
0
url pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
purl pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qd1-jvb8-jqak
1
vulnerability VCID-7xq5-z572-xub3
2
vulnerability VCID-f6n6-k5ye-3ugq
3
vulnerability VCID-jvcy-2qyh-jqg4
4
vulnerability VCID-rcep-az2v-1yab
5
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1
aliases DSA-4442-2 cups-filters
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dsn-96eh-bbh4
3
url VCID-ed99-uccv-d7bh
vulnerability_id VCID-ed99-uccv-d7bh
summary
Multiple vulnerabilities have been found in cups-filters, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3279
reference_id
reference_type
scores
0
value 0.34505
scoring_system epss
scoring_elements 0.96967
published_at 2026-04-01T12:55:00Z
1
value 0.34505
scoring_system epss
scoring_elements 0.96975
published_at 2026-04-02T12:55:00Z
2
value 0.34505
scoring_system epss
scoring_elements 0.96979
published_at 2026-04-04T12:55:00Z
3
value 0.34505
scoring_system epss
scoring_elements 0.96981
published_at 2026-04-07T12:55:00Z
4
value 0.34505
scoring_system epss
scoring_elements 0.9699
published_at 2026-04-08T12:55:00Z
5
value 0.34505
scoring_system epss
scoring_elements 0.96991
published_at 2026-04-09T12:55:00Z
6
value 0.34505
scoring_system epss
scoring_elements 0.96993
published_at 2026-04-11T12:55:00Z
7
value 0.34505
scoring_system epss
scoring_elements 0.96994
published_at 2026-04-12T12:55:00Z
8
value 0.34505
scoring_system epss
scoring_elements 0.96995
published_at 2026-04-13T12:55:00Z
9
value 0.34505
scoring_system epss
scoring_elements 0.97004
published_at 2026-04-16T12:55:00Z
10
value 0.34505
scoring_system epss
scoring_elements 0.97007
published_at 2026-04-18T12:55:00Z
11
value 0.34505
scoring_system epss
scoring_elements 0.9701
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3279
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1238990
reference_id 1238990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1238990
5
reference_url https://security.gentoo.org/glsa/201510-08
reference_id GLSA-201510-08
reference_type
scores
url https://security.gentoo.org/glsa/201510-08
6
reference_url https://access.redhat.com/errata/RHSA-2015:2360
reference_id RHSA-2015:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2360
7
reference_url https://usn.ubuntu.com/2659-1/
reference_id USN-2659-1
reference_type
scores
url https://usn.ubuntu.com/2659-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3
purl pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3317-h26p-43ef
1
vulnerability VCID-39f1-22a5-c7aw
2
vulnerability VCID-6qd1-jvb8-jqak
3
vulnerability VCID-7xq5-z572-xub3
4
vulnerability VCID-9dsn-96eh-bbh4
5
vulnerability VCID-ed99-uccv-d7bh
6
vulnerability VCID-f6n6-k5ye-3ugq
7
vulnerability VCID-jvcy-2qyh-jqg4
8
vulnerability VCID-rcep-az2v-1yab
9
vulnerability VCID-uz2u-k3vm-w3c2
10
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%252Bdeb8u3
1
url pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
purl pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qd1-jvb8-jqak
1
vulnerability VCID-7xq5-z572-xub3
2
vulnerability VCID-f6n6-k5ye-3ugq
3
vulnerability VCID-jvcy-2qyh-jqg4
4
vulnerability VCID-rcep-az2v-1yab
5
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1
aliases CVE-2015-3279
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh
4
url VCID-uz2u-k3vm-w3c2
vulnerability_id VCID-uz2u-k3vm-w3c2
summary security update
references
0
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
1
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0491.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0491.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8560.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8560.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8560
reference_id
reference_type
scores
0
value 0.10778
scoring_system epss
scoring_elements 0.93374
published_at 2026-04-21T12:55:00Z
1
value 0.10778
scoring_system epss
scoring_elements 0.93367
published_at 2026-04-18T12:55:00Z
2
value 0.10778
scoring_system epss
scoring_elements 0.93314
published_at 2026-04-01T12:55:00Z
3
value 0.10778
scoring_system epss
scoring_elements 0.93322
published_at 2026-04-02T12:55:00Z
4
value 0.10778
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-07T12:55:00Z
5
value 0.10778
scoring_system epss
scoring_elements 0.93336
published_at 2026-04-08T12:55:00Z
6
value 0.10778
scoring_system epss
scoring_elements 0.93341
published_at 2026-04-09T12:55:00Z
7
value 0.10778
scoring_system epss
scoring_elements 0.93345
published_at 2026-04-11T12:55:00Z
8
value 0.10778
scoring_system epss
scoring_elements 0.93344
published_at 2026-04-13T12:55:00Z
9
value 0.10778
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8560
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560
7
reference_url http://www.debian.org/security/2015/dsa-3419
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3419
8
reference_url http://www.debian.org/security/2015/dsa-3429
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3429
9
reference_url http://www.openwall.com/lists/oss-security/2015/12/13/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/13/2
10
reference_url http://www.openwall.com/lists/oss-security/2015/12/14/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/14/13
11
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
12
reference_url http://www.ubuntu.com/usn/USN-2838-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2838-1
13
reference_url http://www.ubuntu.com/usn/USN-2838-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2838-2
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291227
reference_id 1291227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291227
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807930
reference_id 807930
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807930
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807993
reference_id 807993
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807993
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8560
reference_id CVE-2015-8560
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2015-8560
79
reference_url https://access.redhat.com/errata/RHSA-2016:0491
reference_id RHSA-2016:0491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0491
80
reference_url https://usn.ubuntu.com/2838-1/
reference_id USN-2838-1
reference_type
scores
url https://usn.ubuntu.com/2838-1/
81
reference_url https://usn.ubuntu.com/2838-2/
reference_id USN-2838-2
reference_type
scores
url https://usn.ubuntu.com/2838-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3
purl pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3317-h26p-43ef
1
vulnerability VCID-39f1-22a5-c7aw
2
vulnerability VCID-6qd1-jvb8-jqak
3
vulnerability VCID-7xq5-z572-xub3
4
vulnerability VCID-9dsn-96eh-bbh4
5
vulnerability VCID-ed99-uccv-d7bh
6
vulnerability VCID-f6n6-k5ye-3ugq
7
vulnerability VCID-jvcy-2qyh-jqg4
8
vulnerability VCID-rcep-az2v-1yab
9
vulnerability VCID-uz2u-k3vm-w3c2
10
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%252Bdeb8u3
1
url pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
purl pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qd1-jvb8-jqak
1
vulnerability VCID-7xq5-z572-xub3
2
vulnerability VCID-f6n6-k5ye-3ugq
3
vulnerability VCID-jvcy-2qyh-jqg4
4
vulnerability VCID-rcep-az2v-1yab
5
vulnerability VCID-vzgv-8drt-8yd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1
aliases CVE-2015-8560
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uz2u-k3vm-w3c2
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1