Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
Typedeb
Namespacedebian
Namecups-filters
Version1.28.17-3+deb12u2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6qd1-jvb8-jqak
vulnerability_id VCID-6qd1-jvb8-jqak
summary cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64503
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06713
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06652
published_at 2026-04-11T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-12T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06637
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06564
published_at 2026-04-16T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06556
published_at 2026-04-18T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14926
published_at 2026-04-04T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14849
published_at 2026-04-02T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14874
published_at 2026-04-09T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14819
published_at 2026-04-08T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14728
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697
reference_id 1120697
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698
reference_id 1120698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414705
reference_id 2414705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414705
7
reference_url https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865
reference_id 50d94ca0f2fa6177613c97c59791bde568631865
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865
8
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9
reference_id GHSA-893j-2wr2-wrh9
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9
9
reference_url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620
reference_id pdftoraster.cxx#L1620
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620
10
reference_url https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790
reference_id pdftoraster.cxx#L1790
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790
11
reference_url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880
reference_id pdftoraster.cxx#L1880
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880
12
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
13
reference_url https://usn.ubuntu.com/7877-1/
reference_id USN-7877-1
reference_type
scores
url https://usn.ubuntu.com/7877-1/
14
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2025-64503
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qd1-jvb8-jqak
1
url VCID-7xq5-z572-xub3
vulnerability_id VCID-7xq5-z572-xub3
summary cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57812
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04222
published_at 2026-04-21T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04165
published_at 2026-04-11T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04148
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04123
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04094
published_at 2026-04-16T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-18T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15646
published_at 2026-04-04T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15579
published_at 2026-04-02T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15589
published_at 2026-04-09T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15534
published_at 2026-04-08T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703
reference_id 1120703
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704
reference_id 1120704
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414632
reference_id 2414632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414632
7
reference_url https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa
reference_id b69dfacec7f176281782e2f7ac44f04bf9633cfa
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa
8
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4
reference_id GHSA-jpxg-qc2c-hgv4
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4
9
reference_url https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32
reference_id image-tiff.c#L32
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32
10
reference_url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34
reference_id image-tiff.c#L34
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34
11
reference_url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613
reference_id imagetoraster.c#L613
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613
12
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
13
reference_url https://usn.ubuntu.com/7877-1/
reference_id USN-7877-1
reference_type
scores
url https://usn.ubuntu.com/7877-1/
14
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2025-57812
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xq5-z572-xub3
2
url VCID-f6n6-k5ye-3ugq
vulnerability_id VCID-f6n6-k5ye-3ugq
summary cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47076
reference_id
reference_type
scores
0
value 0.73875
scoring_system epss
scoring_elements 0.98827
published_at 2026-04-18T12:55:00Z
1
value 0.73875
scoring_system epss
scoring_elements 0.98825
published_at 2026-04-16T12:55:00Z
2
value 0.73875
scoring_system epss
scoring_elements 0.98821
published_at 2026-04-13T12:55:00Z
3
value 0.73875
scoring_system epss
scoring_elements 0.9882
published_at 2026-04-12T12:55:00Z
4
value 0.73875
scoring_system epss
scoring_elements 0.98819
published_at 2026-04-11T12:55:00Z
5
value 0.73875
scoring_system epss
scoring_elements 0.98817
published_at 2026-04-09T12:55:00Z
6
value 0.73875
scoring_system epss
scoring_elements 0.98813
published_at 2026-04-04T12:55:00Z
7
value 0.73875
scoring_system epss
scoring_elements 0.98816
published_at 2026-04-07T12:55:00Z
8
value 0.74242
scoring_system epss
scoring_elements 0.98849
published_at 2026-04-21T12:55:00Z
9
value 0.74242
scoring_system epss
scoring_elements 0.9883
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47076
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821
reference_id 1082821
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827
reference_id 1082827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314253
reference_id 2314253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314253
7
reference_url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
reference_id Attacking-UNIX-systems-via-CUPS-Part-I
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
8
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
reference_id GHSA-7xfx-47qg-grp6
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
9
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
reference_id GHSA-p9rh-jxmq-gq47
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
10
reference_url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
reference_id GHSA-rj88-6mr5-rcw8
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
11
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
reference_id GHSA-w63j-6g73-wmg5
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
12
reference_url https://access.redhat.com/errata/RHSA-2024:7346
reference_id RHSA-2024:7346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7346
13
reference_url https://access.redhat.com/errata/RHSA-2024:7461
reference_id RHSA-2024:7461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7461
14
reference_url https://access.redhat.com/errata/RHSA-2024:7462
reference_id RHSA-2024:7462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7462
15
reference_url https://access.redhat.com/errata/RHSA-2024:7463
reference_id RHSA-2024:7463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7463
16
reference_url https://access.redhat.com/errata/RHSA-2024:7503
reference_id RHSA-2024:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7503
17
reference_url https://access.redhat.com/errata/RHSA-2024:7504
reference_id RHSA-2024:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7504
18
reference_url https://access.redhat.com/errata/RHSA-2024:7506
reference_id RHSA-2024:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7506
19
reference_url https://access.redhat.com/errata/RHSA-2024:7551
reference_id RHSA-2024:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7551
20
reference_url https://access.redhat.com/errata/RHSA-2024:7553
reference_id RHSA-2024:7553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7553
21
reference_url https://access.redhat.com/errata/RHSA-2024:7623
reference_id RHSA-2024:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7623
22
reference_url https://usn.ubuntu.com/7043-1/
reference_id USN-7043-1
reference_type
scores
url https://usn.ubuntu.com/7043-1/
23
reference_url https://usn.ubuntu.com/7043-4/
reference_id USN-7043-4
reference_type
scores
url https://usn.ubuntu.com/7043-4/
24
reference_url https://usn.ubuntu.com/7044-1/
reference_id USN-7044-1
reference_type
scores
url https://usn.ubuntu.com/7044-1/
25
reference_url https://www.cups.org
reference_id www.cups.org
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://www.cups.org
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2024-47076
risk_score 10.0
exploitability 2.0
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6n6-k5ye-3ugq
3
url VCID-jvcy-2qyh-jqg4
vulnerability_id VCID-jvcy-2qyh-jqg4
summary cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47176
reference_id
reference_type
scores
0
value 0.87039
scoring_system epss
scoring_elements 0.99443
published_at 2026-04-21T12:55:00Z
1
value 0.87039
scoring_system epss
scoring_elements 0.99434
published_at 2026-04-02T12:55:00Z
2
value 0.87593
scoring_system epss
scoring_elements 0.99462
published_at 2026-04-09T12:55:00Z
3
value 0.87593
scoring_system epss
scoring_elements 0.99461
published_at 2026-04-08T12:55:00Z
4
value 0.87593
scoring_system epss
scoring_elements 0.99468
published_at 2026-04-18T12:55:00Z
5
value 0.87593
scoring_system epss
scoring_elements 0.99467
published_at 2026-04-16T12:55:00Z
6
value 0.87593
scoring_system epss
scoring_elements 0.99464
published_at 2026-04-13T12:55:00Z
7
value 0.87593
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-11T12:55:00Z
8
value 0.87593
scoring_system epss
scoring_elements 0.99458
published_at 2026-04-04T12:55:00Z
9
value 0.87593
scoring_system epss
scoring_elements 0.9946
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820
reference_id 1082820
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314252
reference_id 2314252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314252
6
reference_url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
reference_id Attacking-UNIX-systems-via-CUPS-Part-I
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
7
reference_url https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992
reference_id cups-browsed.c#L13992
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992
8
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
reference_id GHSA-7xfx-47qg-grp6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
9
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
reference_id GHSA-p9rh-jxmq-gq47
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
10
reference_url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
reference_id GHSA-rj88-6mr5-rcw8
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
11
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
reference_id GHSA-w63j-6g73-wmg5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
12
reference_url https://access.redhat.com/errata/RHSA-2024:7346
reference_id RHSA-2024:7346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7346
13
reference_url https://access.redhat.com/errata/RHSA-2024:7461
reference_id RHSA-2024:7461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7461
14
reference_url https://access.redhat.com/errata/RHSA-2024:7462
reference_id RHSA-2024:7462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7462
15
reference_url https://access.redhat.com/errata/RHSA-2024:7463
reference_id RHSA-2024:7463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7463
16
reference_url https://access.redhat.com/errata/RHSA-2024:7503
reference_id RHSA-2024:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7503
17
reference_url https://access.redhat.com/errata/RHSA-2024:7504
reference_id RHSA-2024:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7504
18
reference_url https://access.redhat.com/errata/RHSA-2024:7506
reference_id RHSA-2024:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7506
19
reference_url https://access.redhat.com/errata/RHSA-2024:7551
reference_id RHSA-2024:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7551
20
reference_url https://access.redhat.com/errata/RHSA-2024:7553
reference_id RHSA-2024:7553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7553
21
reference_url https://access.redhat.com/errata/RHSA-2024:7623
reference_id RHSA-2024:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7623
22
reference_url https://usn.ubuntu.com/7042-1/
reference_id USN-7042-1
reference_type
scores
url https://usn.ubuntu.com/7042-1/
23
reference_url https://usn.ubuntu.com/7042-2/
reference_id USN-7042-2
reference_type
scores
url https://usn.ubuntu.com/7042-2/
24
reference_url https://usn.ubuntu.com/7042-3/
reference_id USN-7042-3
reference_type
scores
url https://usn.ubuntu.com/7042-3/
25
reference_url https://usn.ubuntu.com/7043-1/
reference_id USN-7043-1
reference_type
scores
url https://usn.ubuntu.com/7043-1/
26
reference_url https://usn.ubuntu.com/7043-2/
reference_id USN-7043-2
reference_type
scores
url https://usn.ubuntu.com/7043-2/
27
reference_url https://usn.ubuntu.com/7043-3/
reference_id USN-7043-3
reference_type
scores
url https://usn.ubuntu.com/7043-3/
28
reference_url https://usn.ubuntu.com/7043-4/
reference_id USN-7043-4
reference_type
scores
url https://usn.ubuntu.com/7043-4/
29
reference_url https://www.cups.org
reference_id www.cups.org
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://www.cups.org
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2024-47176
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvcy-2qyh-jqg4
4
url VCID-rcep-az2v-1yab
vulnerability_id VCID-rcep-az2v-1yab
summary cups-filters: cups-filters: Heap buffer overflow in rastertopclx filter may lead arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64524
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-18T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09791
published_at 2026-04-02T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09865
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09873
published_at 2026-04-11T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09837
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09821
published_at 2026-04-13T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09703
published_at 2026-04-16T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09841
published_at 2026-04-04T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09742
published_at 2026-04-07T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09813
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414780
reference_id 2414780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414780
5
reference_url https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06
reference_id 956283c74a34ae924266a2a63f8e5f529a1abd06
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/
url https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06
6
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv
reference_id GHSA-rq44-2q5p-x3hv
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv
7
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
8
reference_url https://usn.ubuntu.com/7878-2/
reference_id USN-7878-2
reference_type
scores
url https://usn.ubuntu.com/7878-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2
aliases CVE-2025-64524
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcep-az2v-1yab
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2